Terms Detailed Security ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Terms Detailed Security Review returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Data Center Management
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Storage Security
 •   Virtualization
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Network Security
 •   Application Security
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Concerns Terms Detailed Security
 •   Payment Terms
 •   Statistics Terms Detailed Security
 •   Study Terms
 •   Terms Detailed Hawaii
 •   Terms Detailed Security Alaska
 •   Terms Detailed Security Montana
 •   Terms Layout
 •   Terms Sheets
 •   Work Terms Detailed Security
Advertisement

ALL RESULTS
1 - 25 of 434 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Effectively Manage Permissions in Microsoft SharePoint 2010 by TITUS

March 19, 2012 - (Free Research)
This white paper details security permissions of SharePoint. Read on to learn how you can apply security permissions  to sensitive content in SharePoint and further you understanding of fine grained permissions within SharePoint without affecting business operations. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 27, 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

Making Sense of the Wireless World - BlackBerry for Wireless LAN by BlackBerry

January 2005 - (Free Research)
This white paper reviews past and present technologies including a discussion of circuits and packets and also compares WLAN and WWAN networks in terms of advantages, challenges, and issues to consider when considering a wireless solution. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Tape Storage Systems Continue to Evolve with Long-Term Data Archiving Functionality by Spectra Logic Corporation

May 2012 - (Free Research)
This tutorial will cover the latest developments in tape storage systems and review the major differences between backup software vs. archiving software. The benefits of tape storage systems, including long-term data archiving will also be discussed. 
(EGUIDE) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

How to Select the Correct RAID for an EqualLogic SAN by Dell India

September 2009 - (Free Research)
One of the most important decisions that you have to make when deploying a new storage solution is what RAID type(s) to use. Read this white paper for a discussion on how to select the right RAID policy for your Dell EqualLogic™ storage area network (SAN) arrays. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing Review by SearchDataCenter.com

June 2011 - (Free Research)
The first edition of Cloud Computing Review tackles the big questions about cloud computing, such as does the cloud really save you money? Find out about the hidden costs of cloud, as well as what you should pay attention to in cloud contracts. Plus, explore the link between enterprise applications and the cloud through a detailed case study. 
(EZINE) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

EMC VNXe Data Protection - A Detailed Review by EMC Backup and Recovery Solutions

May 2011 - (Free Research)
This white paper details the integrated features that can be positioned for business continuity in the EMC VNXe series platforms. Data protection features include snapshots, replication, and NDMP backups. 
(WHITE PAPER) READ ABSTRACT |

Ovum briefing: The cloud computing strategies of major telcos by ComputerWeekly.com

December 2010 - (Free Research)
The major global telcos have led the competitive march from telecoms into cloud computing, and are now widely seen as credible players in cloud computing services including infrastructure-as-a-service (IaaS). 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint by IBM

December 2008 - (Free Research)
This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns? 
(WHITE PAPER) READ ABSTRACT |

Data Mart Consolidation by Hexaware Technologies

September 2011 - (Free Research)
This white paper explores how Data Mart consolidation is an effective tool for saving money when dealing with large volumes of data. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Data Loss Prevention: Reducing Complexity by BlueCoat

September 2010 - (Free Research)
In recent years, organizations have come to recognize the critical importance of safeguarding sensitive information. Read this white paper to discover the important role Data Loss Prevention (DLP) plays in maintaining the security of sensitive data. 
(WHITE PAPER) READ ABSTRACT |

IBM Storwize V7000 vs. EMC VNX5500: Which Storage Solution Reigns Supreme? by IBM

April 2012 - (Free Research)
This whitepaper details the results of a study that compared the IBM Storwize V7000 and EMC VNX5500 in terms of block-based storage and operational expenses. 
(WHITE PAPER) READ ABSTRACT |

Taneja Group Reviews Hybrid Blade Arrays: The Storage Foundation for a Converged VDI Solution by Dell and VMware

December 2012 - (Free Research)
This white paper details a solution to virtualized desktop issues often caused by antiquated storage infrastructure and methods. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation API Delivery Platform : How to Use an API Server to Manage, Deliver and Secure APIs by Vordel now part of Axway

April 2013 - (Free Research)
In this white paper, discover the next generation of APIs: API delivery platforms and servers. Read on for more information and details on API management, security, and delivery, the next generation of application architecture, key app design and usage changes, and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Cloud Computing Security and Regulatory Compliance by Dell, Inc.

March 2012 - (Free Research)
This presentation transcript, featuring Jim Reavis of the Cloud Security Alliance, offers advice on how to secure your cloud. Reavis discusses high level vs. detailed cloud security frameworks and suggests questions to ask potential cloud vendors. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Disk-based Data Protection Options: The Changing Data Protection Landscape by ExaGrid Systems, Inc.

October 2008 - (Free Research)
This paper will compare and contrast the benefits of all new disk-based data protection options to allow you to select the best technology for each of the data types to be protected in your environment. 
(WHITE PAPER) READ ABSTRACT |

Developing an Enterprise Client Virtualization Strategy by Intel Corporation

November 2008 - (Free Research)
Intel conducted a series of studies to analyze the potential benefits of each technology and to begin to develop a targeted strategy for delivering client virtualization to our users. Read this document to review the findings. 
(WHITE PAPER)

1 - 25 of 434 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts