Vendor Smarteam Gateway AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Vendor Smarteam Gateway And returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Web Transaction Control Gateways
 •   Storage Management
 •   Security Monitoring
 •   Storage Security
 •   Virtualization

Related Searches
 •   Automated Vendor Smarteam
 •   Calendar Vendor Smarteam
 •   Hr Vendor Smarteam Gateway
 •   Planner Vendor Smarteam
 •   Product Vendor Smarteam
 •   Vendor Calendars
 •   Vendor Designs
 •   Vendor Group
 •   Vendor Maryland
 •   Vendor Smarteam History
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Introduction to Evolved Packet Core by Alcatel-Lucent

June 09, 2009 - (Free Research)
This white paper provides a brief introduction to Evolved Packet Core - a new mobile core for LTE. Key concepts and functional elements are outlined, as well as key changes in LTE requirements imposed on the Evolved Packet Core, and the deployment challenges one can expect to encounter. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services by SearchSecurity.com

March 14, 2012 - (Free Research)
Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Pilgrim's Pride Cuts IT Costs of ConAgra Acquisition Using SEEBURGER to Speed B2B & SAP Integration by SEEBURGER

October 2008 - (Free Research)
Read how SEEBURGER's B2B Gateway and SAP Connector reduced time to market and development costs for both the ConAgra IT integration and subsequent projects through its ability to eliminate hard coding within SAP as well as handle B2B and EAI design. 
(CASE STUDY) READ ABSTRACT |

5 Cloud gateway options by CommVault Systems, Inc.

May 2012 - (Free Research)
What is a cloud gateway? Let Arun Taneja, of Taneja Group, tell you about cloud gateways, options and use cases for each in this expert e-guide. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Navigating B2B Integration Options for Oracle E-Business Suite by EXTOL International, Inc.

July 2009 - (Free Research)
This presentation transcript examines the main B2B integration options facing Oracle E-Business Suite users and explains how to maximize B2B effectiveness and flexibility. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.

February 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit... 
(WHITE PAPER) READ ABSTRACT |

Stopping data leakage: Exploiting your existing security investment by Sophos, Inc.

June 2008 - (Free Research)
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made. 
(WHITE PAPER) READ ABSTRACT |

Blue Coat WebFilter by BlueCoat

December 2008 - (Free Research)
Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them. 
(DATA SHEET) READ ABSTRACT |

Secure Mobile Access for Enterprise Employees by CA Technologies.

December 2012 - (Free Research)
This white paper explains the top 4 challenges of integrating corporate data with mobile applications for remote users. Click now to unveil a solution that acts as a mobile gateway and ensures data adaptation, performance optimization, security, and improved management for mobile developers. 
(WHITE PAPER) READ ABSTRACT |

Improve BYOD with the Bonjour Protocol by Aerohive Networks

November 2012 - (Free Research)
This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy. 
(EGUIDE) READ ABSTRACT |

VMware vCloud API Abstraction by Layer 7 Technologies

July 2011 - (Free Research)
Cloud computing offers your organization efficiency, flexibility and scalability, but managing cloud-based applications can be extremely challenging. Access this resource for a detailed overview of Layer 7 Technologies' CloudControl gateway and learn how it can deliver protection, abstraction and metering for your cloud-based applications. 
(PRODUCT OVERVIEW)

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.

November 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost. 
(WHITE PAPER) READ ABSTRACT |

Cloud storage options for primary or nearline data by Iomega Corporation, an EMC Company

August 2012 - (Free Research)
Cloud storage can be used for more than disaster recovery, archiving and backup. Access this E-Guide to learn why storing primary data in the could is a viable, and beneficial option. 
(WHITE PAPER) READ ABSTRACT |

Nimsoft for Cisco VoIP Monitoring by Nimsoft, Inc.

February 2011 - (Free Research)
Today’s successful VoIP deployments require incessant network availability and 360 degree transparency of the infrastructure. Read this paper to learn how to achieve this requirement by proactively monitoring end-to-end performance of all VoIP components for improved quality of service and problem diagnosis. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine

March 2011 - (Free Research)
This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act. 
(EGUIDE) READ ABSTRACT |

Email and Web Security SaaS by Webroot

April 2009 - (Free Research)
Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Web Threats by BlueCoat

January 2009 - (Free Research)
This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings. 
(ANALYST REPORT) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation Secure Web Gateways:The Case and Criteria for Embedded DLP with Advanced Malware Defenses by Websense, Inc.

May 2012 - (Free Research)
<p>While the Web has become a core business communication platform, it’s also a highly popular target for cybercriminals and hackers. This resource explores how to mitigate the risk of data loss over Web channels, uncovering the business need for DLP as part of Web Security Gateways and the key criteria to consider when choosing a solution.</p> 
(WHITE PAPER) READ ABSTRACT |

Not All SOA Gateways Are Created Equal by CA Technologies.

December 2011 - (Free Research)
Most service-oriented architecture (SOA) gateways offer similar functionality: they address security and performance issues that arise when using XML-based messaging protocols. However, not all SOA gateways are created equal, as the total cost of ownership (TCO) can vary greatly. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Secure Web Gateway by BlueCoat

May 2011 - (Free Research)
This Gartner report delves into the SWG market, highlighting today’s key drivers, emerging trends, and available solutions. View now to explore a variety of SWG providers of both on-premise equipment and cloud-based services, and discover where each vendor stands in the market based on Gardner’s Magic Quadrant. 
(ANALYST REPORT) READ ABSTRACT |

Best Practices in Using Reputation-based Anti-Spam Services for Email Security by IronPort Systems

February 2009 - (Free Research)
This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services. 
(WHITE PAPER) READ ABSTRACT |

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 2012 - (Free Research)
Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts