Wave Embassy Security SourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Wave Embassy Security Source returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Enterprise Systems Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Mobile Device Management

Related Searches
 •   Demo Wave Embassy Security
 •   Layer Wave Embassy
 •   Licenses Wave Embassy
 •   Notes Wave Embassy Security
 •   Parts Of Wave Embassy
 •   Standards Wave Embassy
 •   Wave Embassy Security Environment
 •   Wave Embassy Security Montana
 •   Wave Embassy Security Spreadsheet
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

EMBASSY Remote Administration Server (ERAS) by Wave Systems Corp.

February 01, 2008 - (Free Research)
Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Open Source in the Next Computing Wave by Red Hat and JBoss

January 09, 2009 - (Free Research)
The current economic climate is forcing more systematic thinking about costs in general, including those associated with overall complexity and the security and resiliency of large distributed infrastructures. These trends intersect in powerful ways; a new wave of computing is gathering momentum as a result. And open source is playing a major role. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs by FireEye

December 31, 2013 - (Free Research)
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks. 
(WHITE PAPER) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 19, 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

The Forrester Wave: EnterpriseService Bus, Q2 2011 by Oracle Corporation

June 21, 2011 - (Free Research)
This Forrester’s Wave report provides an unbiased evaluation of the strengths and weaknesses of top ESB vendors across a range of criteria. This in-depth guide not only contains coverage of features, vendors and products, but also features real-world input from over 20 customers currently using the evaluated products. 
(ANALYST REPORT) READ ABSTRACT |

Maximize Your Storage Spend by Doing More with Less - Transcript by Red Hat

February 23, 2012 - (Free Research)
Download this presentation transcript to discover how to free yourself from vendor lock-in by expensive proprietary storage hardware companies, and learn how you can take advantage of today's new wave of storage buying. Find out how you can do more with your existing storage and spend less time and money to accommodate changing workloads. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Video - Andrew Bartolini on Collaborative Sourcing by Ariba, Inc.

December 22, 2011 - (Free Research)
Ardent Partners analyst and CPO Rising author, Andrew Bartolini, shares his insights into successful buyer/seller collaboration and supply chain sourcing. 
(VIDEOCAST) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 27, 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

Storage and the Private Cloud: Taking Virtualization to the Next Level by Oracle Corporation

February 15, 2012 - (Free Research)
This paper describes how virtualization has affected storage technologies and how Oracle’s storage solutions enable organizations to reduce IT costs, accelerate provisioning of private cloud services and achieve higher service levels. 
(WHITE PAPER) READ ABSTRACT |

Global Trends Drive Business Strategies by Alcatel-Lucent

August 16, 2010 - (Free Research)
Today’s business models do not create the commensurate revenue to fund the investment to deliver against growing traffic volumes. This is particularly salient in North America as CSPs provide more services and bandwidth on flat rate ‘all-you-can-eat’ price models. Read this paper to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Malware: Osterman Research by Sunbelt Software

September 2008 - (Free Research)
This paper addresses the variety of issues organizations face in context of their security challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Web Threats by BlueCoat

January 2009 - (Free Research)
This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings. 
(ANALYST REPORT) READ ABSTRACT |

Protecting Against the New Wave of Malware by GFI Software

March 2011 - (Free Research)
Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges. 
(WHITE PAPER) READ ABSTRACT |

Healthcare IT Channel E-Book: Ride the Health Care IT Modernization Wave: How To Enter the Health Care Technology Market or Grow Your Existing Healthcare IT Business by Stratus Technologies

August 2011 - (Free Research)
More than 75% of hospitals view electronic health records (EHRs) as the primary driver of IT spending and almost as many believe that EHR implementations will transform their IT environments. Inside this expert e-book, learn how healthcare facilities are preparing for network, storage and security changes in order to accommodate EHR implementation. 
(EBOOK)

Protecting Your Multi-Platform Network: The New Wave of Attacks by ESET

June 2011 - (Free Research)
Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets. 
(WEBCAST) READ ABSTRACT |

Scaling Enterprise SOA Deployments: Benefits of a Message-Driven Approach Powering Next-Generation SOA Deployments by Fiorano Software, Inc.

August 2008 - (Free Research)
This paper reviews modern enterprise service grids and how their brokered peer-to-peer architecture offer ease of use for a wide array of distributed computing projects including the SOA market. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Surviving the Tidal Wave of Data with a Holistic Approach to Data Reduction by IBM Rational

January 2011 - (Free Research)
This presentation transcript reviews the options and trends for controlling data growth by reducing your data storage footprint. Milan K. Patel, Sr. Marketing Manager for Tivoli Storage contributes thoughts on how IBM can help you achieve your data reduction goals. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Trusted Computing: What the Future Looks Like by Wave Systems Corp.

September 2010 - (Free Research)
Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries. 
(VIDEOCAST) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Reassessing DDoS - Lessons Learned by Neustar®

March 2014 - (Free Research)
This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into. 
(PODCAST) READ ABSTRACT |

Financial Institutions, Merchants, and the Race Against Cyberthreats by EMC Corporation

October 2013 - (Free Research)
Access this informative, in-depth white paper and discover why financial institutions and merchants are the most common targets for cyber-attacks, and what steps these businesses can take to protect themselves against attacks. 
(WHITE PAPER) READ ABSTRACT |

Rethinking Your Enterprise Security by Hewlett-Packard Company

May 2012 - (Free Research)
The fact is that the world is constantly evolving, and always connected, and your enterprise must be too. View this resource to learn about modern threats and what you should do to remains safe. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts