Terms Detailed Security ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Terms Detailed Security Review returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Data Center Management
 •   Storage Security
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Enterprise Data Protection and Privacy
 •   Disk-based Backup & Storage/ RAID
 •   Network Security
 •   Virtualization
 •   Application Security

Related Searches
 •   Benefit Terms Detailed Security
 •   Make Terms
 •   Purchasing Terms Detailed Security
 •   Technologies Terms Detailed
 •   Terms Detailed Methodology
 •   Terms Detailed Security Articles
 •   Terms Detailed Security Display
 •   Terms Detailed Security Help
 •   Terms Detailed West Virginia
 •   Terms Firms
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Effectively Manage Permissions in Microsoft SharePoint 2010 by TITUS

March 19, 2012 - (Free Research)
This white paper details security permissions of SharePoint. Read on to learn how you can apply security permissions  to sensitive content in SharePoint and further you understanding of fine grained permissions within SharePoint without affecting business operations. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 27, 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

Making Sense of the Wireless World - BlackBerry for Wireless LAN by BlackBerry

January 2005 - (Free Research)
This white paper reviews past and present technologies including a discussion of circuits and packets and also compares WLAN and WWAN networks in terms of advantages, challenges, and issues to consider when considering a wireless solution. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Tape Storage Systems Continue to Evolve with Long-Term Data Archiving Functionality by Spectra Logic Corporation

May 2012 - (Free Research)
This tutorial will cover the latest developments in tape storage systems and review the major differences between backup software vs. archiving software. The benefits of tape storage systems, including long-term data archiving will also be discussed. 
(EGUIDE) READ ABSTRACT |

How to Select the Correct RAID for an EqualLogic SAN by Dell India

September 2009 - (Free Research)
One of the most important decisions that you have to make when deploying a new storage solution is what RAID type(s) to use. Read this white paper for a discussion on how to select the right RAID policy for your Dell EqualLogic™ storage area network (SAN) arrays. 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

EMC VNXe Data Protection - A Detailed Review by EMC Backup and Recovery Solutions

May 2011 - (Free Research)
This white paper details the integrated features that can be positioned for business continuity in the EMC VNXe series platforms. Data protection features include snapshots, replication, and NDMP backups. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Ovum briefing: The cloud computing strategies of major telcos by ComputerWeekly.com

December 2010 - (Free Research)
The major global telcos have led the competitive march from telecoms into cloud computing, and are now widely seen as credible players in cloud computing services including infrastructure-as-a-service (IaaS). 
(WHITE PAPER) READ ABSTRACT |

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

Data Mart Consolidation by Hexaware Technologies

September 2011 - (Free Research)
This white paper explores how Data Mart consolidation is an effective tool for saving money when dealing with large volumes of data. 
(WHITE PAPER) READ ABSTRACT |

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint by IBM

December 2008 - (Free Research)
This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns? 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Data Loss Prevention: Reducing Complexity by BlueCoat

September 2010 - (Free Research)
In recent years, organizations have come to recognize the critical importance of safeguarding sensitive information. Read this white paper to discover the important role Data Loss Prevention (DLP) plays in maintaining the security of sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Taneja Group Reviews Hybrid Blade Arrays: The Storage Foundation for a Converged VDI Solution by Dell and VMware

December 2012 - (Free Research)
This white paper details a solution to virtualized desktop issues often caused by antiquated storage infrastructure and methods. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Cloud Computing Security and Regulatory Compliance by Dell, Inc.

March 2012 - (Free Research)
This presentation transcript, featuring Jim Reavis of the Cloud Security Alliance, offers advice on how to secure your cloud. Reavis discusses high level vs. detailed cloud security frameworks and suggests questions to ask potential cloud vendors. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession by Information Security Magazine

February 2009 - (Free Research)
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture. 
(EBOOK) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

How to Prove, Identify and Establish Trust in E-Business by Dell Software

March 2008 - (Free Research)
This technical brief explains how you can prove the identity of the other party in an e-transaction or exchange of information and also describes why Quest’s Defender is an excellent solution to help you accomplish this. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Is SaaS the Future of Enterprise Security? by Webroot

June 2009 - (Free Research)
This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Inside The Cloud, Key Security Factors When Considering Managed Services by AT&T Corp

December 2009 - (Free Research)
This Presentation Transcript offers an overview of the cloud computing landscape as it relates to information security. Few organizations realize the vast and inherent risks that cloud computing presents, including data exposure, data loss, and a compromised infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts