Transportation Security FormatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Transportation Security Format returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Data Protection and Privacy
 •   Disaster Recovery

Related Searches
 •   Configurations Transportation
 •   Diagram Transportation Security Format
 •   Group Transportation Security
 •   Manual Transportation Security
 •   Sheets Transportation Security
 •   Supply Transportation Security Format
 •   Technical Transportation Security
 •   Transportation Security Kansas
 •   Uk Transportation Security Format
Advertisement

ALL RESULTS
1 - 25 of 499 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Dedicated Transportation: Extra Care for Your Critical Data by Iron Mountain

May 12, 2011 - (Free Research)
Watch this brief demo to learn about Iron Mountain's new Dedicated Transportation service, which ensures the safe delivery of your data to its destination. 
(WEBCAST) READ ABSTRACT |

Six Tips for Reducing Downtime in Travel and Transport by Marathon Technologies

February 23, 2010 - (Free Research)
Whether it's a security system, baggage handling application, order or vessel tracking downtime to applications supporting travel and transportation can throw off precisely timed schedules for travelers and shipments alike. This paper outlines six key tips for keeping travel and transportation logistics applications running without interruption. 
(WHITE PAPER) READ ABSTRACT |

Secure Your Backup Tapes Every Step of the Way by Iron Mountain

July 31, 2012 - (Free Research)
This short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service. 
(DATA SHEET) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 13, 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Greenbrier Turns to DocAve® for SharePoint® Data Protection by AvePoint, Inc.

February 04, 2010 - (Free Research)
Greenbrier needed a fast, stable, and scalable SharePoint data protection solution capable of backing up directly to disk, and able to seamlessly integrate with both their existing and intended IT infrastructure. Learn why they turned to AvePoint's DocAve solution for its reliability and modular architecture. 
(CASE STUDY) READ ABSTRACT |

Air Transport Industry Insights 2014 by ComputerWeekly.com

May 01, 2014 - (Free Research)
This report from SITA looks at the impact of business intelligence on airlines and airports. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Networking for Sustainability: The Network Offset Effect by AT&T Corp

April 05, 2010 - (Free Research)
Building on recommendations in the Global e-Sustainability Initiative (GeSI) SMART 2020 report, this paper explains how companies can replace high environmental impact activities with low carbon alternatives through the network. The result? Efficiencies in workplaces, data centers, transportation and logistics, power grids and buildings. 
(WHITE PAPER)

Study Pinpoints Areas of Growth for After-Market Maintenance/Repair/Overhaul Intiaitives by SAP AG

January 23, 2009 - (Free Research)
This study talks about top three trends such as outsourcing MRO, aging aircraft and lean impacting the MRO segment. 
(WHITE PAPER) READ ABSTRACT |

Flying right with a next-generation data center by Dell and VMware

May 24, 2013 - (Free Research)
This exclusive case study examines how a transportation company was able to build a converged data center to eliminate unplanned downtime, increase availability and performance all while cutting costs by 60%. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 2955 Series Switches by Cisco Systems, Inc.

The Cisco Catalyst 2955 Series is an industrial-grade switch that provides Fast Ethernet and Gigabit Ethernet connectivity for deployment in harsh environments. 
(HARDWARE PRODUCT)

SAP® Railcar Management Component: Improve Transportation Visibility and Control Costs by SAP America, Inc.

September 28, 2010 - (Free Research)
This product brief describes how the SAP® Railcar Management Component software gives you this visibility – helping you exert greater control over outbound and inbound logistics processes. Read on to learn the business benefits of SAP Railcar Management Component and learn of the success of three railcar companies that employed the software. 
(WHITE PAPER) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 18, 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

eGuide: Expert Tips for Deploying Secure Messaging Technologies by SearchSecurity.com

October 22, 2008 - (Free Research)
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Remote Access Solution by Cisco Systems, Inc.

July 2008 - (Free Research)
This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources. 
(DEMO) READ ABSTRACT |

CWAT Data Loss Prevention - Whitepaper/Technical Review by Software Engineering of America, Inc.

September 2006 - (Free Research)
CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

Readers' Choice Awards by Information Security Magazine

April 2008 - (Free Research)
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles. 
(JOURNAL ARTICLE)

eBook: Strategies for Securing Virtual Machines by Information Security Magazine

December 2008 - (Free Research)
Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines. 
(EBOOK) READ ABSTRACT |

Enabling Sustainable Compliance Management by IBM

December 2008 - (Free Research)
Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals. 
(WHITE PAPER) READ ABSTRACT |

Beyond UTM -- The Value of a Purpose-built Network Security Platform by Fortinet, Inc.

August 2007 - (Free Research)
It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of. 
(WHITE PAPER) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Integrated Software Enhances Enterprise Security by Intel Corporation

November 2005 - (Free Research)
Intel IT is deploying an integrated security software solution that cuts response time to threats by 90 percent, while addressing enterprise needs for rapid software installation, scalability, reliability, and reporting. 
(ARTICLE)

5 Keys to a Successful Identity and Access Management Implementation by CA Technologies.

December 2007 - (Free Research)
An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation. 
(WHITE PAPER) READ ABSTRACT |

Virtualized Client Solutions: HP Remote Client Solutions (RCS) by Hewlett-Packard Company

August 2008 - (Free Research)
HP offers client virtualization under its HP Remote Client Solutions (RCS) portfolio, andit includes virtualized client solutions like thin clients blade PCs, blade workstations, VDI and server-based computing. 
(DATA SHEET) READ ABSTRACT |

Patch Tuesday Alerts by Lumension

July 2008 - (Free Research)
Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible. 
(PRESS RELEASE) READ ABSTRACT |

1 - 25 of 499 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts