Types WhyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Types Why returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Network Security
 •   Storage Management
 •   Data Center Management
 •   Data Security
 •   Application Management and Maintenance
 •   Anti-Virus Solutions
 •   Enterprise Systems Management
 •   Application Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Evaluation Types
 •   Note Types
 •   Owning Types
 •   Screen Types Why
 •   Service Types
 •   Types Consultants
 •   Types Hardware Provider
 •   Types Latest
 •   Types Practice
 •   Types Why Budgeting
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Coaching Techniques for Dealing with Underperformers by Global Knowledge Network, Inc.

May 2004 - (Free Research)
People do not perform at their job for one of two reasons: either they can't or they won't. The second type of employee is the one we will address in this paper- the employee who chooses not to do his or her job for whatever reason. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Malware: Osterman Research by Sunbelt Software

September 2008 - (Free Research)
This paper addresses the variety of issues organizations face in context of their security challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities. 
(WHITE PAPER) READ ABSTRACT |

If it's Just a Disk, Why the Reliability Gap Between Vendors? by Nexsan

September 2011 - (Free Research)
If all storage array vendors buy disk drives from the same small set of disk manufacturers then why is there such a big reliability gap between storage vendors? This white paper seeks to gain insight into this question. 
(WHITE PAPER) READ ABSTRACT |

Sustainability Matters: Why - and how - business is widening its focus to consider the needs of stakeholders by Oracle Corporation

December 2008 - (Free Research)
This white paper demonstrates how running a responsible business and high levels of performance do not have to work against each other. And it makes a case for why sustainability issues should simply be part of a company’s overall performance management practices. 
(WHITE PAPER) READ ABSTRACT |

ITIL® v3: What It Is and Why You Should Care by Global Knowledge

October 2008 - (Free Research)
This paper explains ITIL by describing its benefits, where it comes from, why you need to know about it, which types of IT organization can benefit from using it, and how to get started. 
(WHITE PAPER) READ ABSTRACT |

eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com

November 2008 - (Free Research)
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy. 
(EBOOK) READ ABSTRACT |

Why Hackers have turned to Malicious JavaScript Attacks by Sophos, Inc.

April 2011 - (Free Research)
Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant. 
(WHITE PAPER) READ ABSTRACT |

Why Unified Storage? by Dell, Inc. and Microsoft

December 2011 - (Free Research)
Check out this expert E-Guide to learn more about unified storage including why the adoption rate is rising among users, how it works and the top advantages of this type of storage. 
(EGUIDE) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Podcast: Why GPUs are critical for all VDI environments, and how to get started by Dell, Inc.

February 2014 - (Free Research)
In this exclusive podcast, Brian Madden sits down with industry insiders to discuss why there is such a strong need for GPUs today, what kind of difference this technology makes for desktop application delivery and how to get started with implementation. 
(PODCAST) READ ABSTRACT |

Why GPUs are critical for all VDI environments, and how to get started by Dell, Inc.

February 2014 - (Free Research)
In this exclusive webcast, Brian Madden sits down with industry insiders to discuss why there is such a strong need for GPUs today, what kind of difference this technology makes for desktop application delivery and how to get started with implementation. 
(WEBCAST) READ ABSTRACT |

Dedupe for Virtual Setups by Dell, Inc.

March 2013 - (Free Research)
This one-page transcript of a presentation by deduplication expert Howard Marks gives an overview of the pros and cons of different dedupe processes, and delves into the type that Microsoft's Hyper-V 3.0 employs and why. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

WAN and VPN Solutions: Choosing the Best Type for your Organization by XO Communications

March 2012 - (Free Research)
This whitepaper describes the different WAN and VPN options organizations have, and helps you figure out which would be the best for your particular needs. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Why your clients should measure their data center energy efficiency by Intel

February 2011 - (Free Research)
Read this E-Guide to learn more about why measuring data center efficiency is important for your clients and what exactly they should be measuring. 
(EGUIDE) READ ABSTRACT |

7 Types of Hard CISSP Exam Questions and How To Approach Them by Global Knowledge Network, Inc.

March 2006 - (Free Research)
Throughout the CISSP preparation course offered by Global Knowledge, we cover the various security mechanisms, principles, concepts, and facts that will be included on the CISSP exam. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

Virtualization for Newbies by Global Knowledge

September 2013 - (Free Research)
This white paper takes a look at the origins of virtualization and how some of the historical development has spurred on today's virtualization. Gain insight on different types of virtualization that are being utilized in the marketplace today and a listing of some of the leading vendors. 
(WHITE PAPER) READ ABSTRACT |

Understanding the HP Data Deduplication Strategy: Why one size doesn't fit everyone by Hewlett Packard Company and Intel

May 2009 - (Free Research)
This white paper explains how HP deduplication technologies work in practice, the pros and cons of each approach, when to choose a particular type, and the type of low-bandwidth replication models HP plans to support. 
(WHITE PAPER) READ ABSTRACT |

Why client hypervisors? by Citrix

June 2010 - (Free Research)
This mediacast features virtualization expert Brian Madden.  Learn when and when not to deploy desktop virtualization and gain insight into the two types of client VMs. 
(WEBCAST) READ ABSTRACT |

Worry-Free Business Security Standard by Trend Micro, Inc.

October 2010 - (Free Research)
Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help. 
(DOWNLOAD) READ ABSTRACT |

Worry-Free Business Security Advanced by Trend Micro, Inc.

October 2010 - (Free Research)
Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help. 
(DOWNLOAD) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Why You Should Consider Hosted Messaging Security by Trend Micro GmbH

February 2009 - (Free Research)
In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Future proofing your cloud: Why workloads define cloud strategies by Citrix

September 2013 - (Free Research)
This whitepaper looks at the two types of workloads—traditional enterprise applications and cloud-native ones—and offers cloud solutions that can meet the needs of both, now and in the future. 
(WHITE PAPER) READ ABSTRACT |

Why Managing Mobility Matters by SAP America, Inc.

January 2011 - (Free Research)
Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment. 
(WHITE PAPER) READ ABSTRACT |

Making Office 365 More Secure and Compliant by Proofpoint, Inc.

December 2011 - (Free Research)
Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts