Wave Systems Corp Embassy Security CenterWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Wave Systems Corp Embassy Security Center returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Network Security
 •   Storage Security
 •   Endpoint Security
 •   Enterprise Systems Management
 •   Security Monitoring

Related Searches
 •   Architecture Wave
 •   Configuration Wave Systems
 •   New Wave Systems
 •   Sample Wave Systems
 •   Scheduling Wave Systems Corp
 •   Wave Java
 •   Wave Systems Corp File
 •   Wave Systems Corp Video
 •   Wave Systems Tracking
 •   Wave Systems White Papers
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

EMBASSY Remote Administration Server (ERAS) by Wave Systems Corp.

February 01, 2008 - (Free Research)
Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine

March 15, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act. 
(EGUIDE) READ ABSTRACT |

E-Book: Encryption - What, Where and How by SearchHealthIT.com

October 26, 2010 - (Free Research)
This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more! 
(EBOOK)

E-Book: Data Protection Plans for Complying with Privacy Laws by SearchSecurity.com & SearchCompliance.com

October 21, 2010 - (Free Research)
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more! 
(EBOOK) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 27, 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs by FireEye

December 31, 2013 - (Free Research)
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks. 
(WHITE PAPER) READ ABSTRACT |

Trusted Computing: What the Future Looks Like by Wave Systems Corp.

September 15, 2010 - (Free Research)
Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries. 
(VIDEOCAST) READ ABSTRACT |

Open Source in the Next Computing Wave by Red Hat and JBoss

January 09, 2009 - (Free Research)
The current economic climate is forcing more systematic thinking about costs in general, including those associated with overall complexity and the security and resiliency of large distributed infrastructures. These trends intersect in powerful ways; a new wave of computing is gathering momentum as a result. And open source is playing a major role. 
(WHITE PAPER) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 19, 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

Choosing the Right Metropolitan Ring for Your Business by AT&T Corp

March 01, 2011 - (Free Research)
Businesses are evolving and looking for more effective and efficient methods of handling bandwidth, performance and end-point needs. In addition, they are trying to anticipate future needs to help make good networking decisions. 
(WHITE PAPER)

CBS E-Book: The Next Generation of Mission-Critical Computing by Oracle Corporation

April 14, 2011 - (Free Research)
View this E-Book to discover why Oracle's SPARC T3 servers represent the next wave of innovation for mission-critical computing and are a logical next step for dealing with today’s most critical data center challenges. 
(EBOOK) READ ABSTRACT |

ISC Corp. Case Study by Emerson Network Power

July 07, 2009 - (Free Research)
ISC Corp. needed a new data center that could efficiently meet current and future needs. Learn how Emerson Network Power and its Liebert power and cooling technologies helped to realize that goal. 
(CASE STUDY) READ ABSTRACT |

NEC Virtual PC Center (VPCC) Product and Technology Overview by NEC Corporation

August 21, 2009 - (Free Research)
NEC offers a complete virtual desktop solution, including all necessary software and a selection of NEC hardware components, including the virtualization hypervisor, management tools, client broker, thin clients, servers, and storage. 
(WHITE PAPER) READ ABSTRACT |

Riding the Virtualization Simplification Wave by D-Link

May 07, 2010 - (Free Research)
Server virtualization is now beginning to deliver functional and economic benefits to nearly all classes of enterprises willing to take the virtualization plunge, down to and including organizations with just a few hundred seats. 
(WHITE PAPER) READ ABSTRACT |

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure by Trend Micro, Inc.

July 15, 2010 - (Free Research)
Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

FireEye Advanced Threat Report - 2H 2011 by FireEye

May 01, 2012 - (Free Research)
This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues. 
(WHITE PAPER) READ ABSTRACT |

Storage and the Private Cloud: Taking Virtualization to the Next Level by Oracle Corporation

February 15, 2012 - (Free Research)
This paper describes how virtualization has affected storage technologies and how Oracle’s storage solutions enable organizations to reduce IT costs, accelerate provisioning of private cloud services and achieve higher service levels. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Cloud backup tutorial: How to leverage cloud backup services by Iron Mountain

July 01, 2009 - (Free Research)
In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup. 
(EBOOK) READ ABSTRACT |

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms by Wave Systems Corp.

August 24, 2010 - (Free Research)
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more. 
(VIDEOCAST) READ ABSTRACT |

Trusted Computing: Establishing Device Authentication by Wave Systems Corp.

August 24, 2010 - (Free Research)
View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard. 
(VIDEOCAST) READ ABSTRACT |

Data Breaches: A Growing Problem for the Healthcare Community by Wave Systems Corp.

March 17, 2011 - (Free Research)
While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss. 
(WHITE PAPER) READ ABSTRACT |

The Avaya Collaborative Cloud by Avaya

March 30, 2012 - (Free Research)
The next wave of cloud computing is upon us. In this resource, discover how you can combine collaboration and networking services to effectively build, deliver, use, and enhance communications in the cloud. 
(WHITE PAPER) READ ABSTRACT |

inStream Solutions launches with Confidence Thanks to Savvis Symphony VPDC by SAVVIS

June 11, 2013 - (Free Research)
Follow this case study to hear about the cloud strategy one organization deployed to improve their test and development environment with an advanced virtual private data center platform. 
(CASE STUDY) READ ABSTRACT |

E-Guide: Chapter 3: Enterprise-Class Tape Library Purchase Considerations by Quantum Corporation

February 09, 2010 - (Free Research)
Now that you've reviewed the essential issues involved in any backup acquisition, this guide focuses on the specific considerations of enterprise-class tape libraries. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors like Quantum Corp., Hewlett-Packard Corp., IBM, SpectraLogic Corp., and more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts