What Vendor ComplianceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: What Vendor Compliance returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Backup Systems and Services
 •   Managed Security Services
 •   Security Policies

Related Searches
 •   Architecture What
 •   Balancing What
 •   Definitions What Vendor Compliance
 •   Media What
 •   Policies What
 •   Report What Vendor Compliance
 •   What Delivery
 •   What Firms
 •   Work What Vendor Compliance
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Podcast: Best practices for reusing data backup tapes by Iron Mountain

August 10, 2012 - (Free Research)
Listen to this podcast with W. Curtis Preston to find out what vendors really mean when they quote a tape age, learn about how to decide when a tape is ready to be discarded and get the scoop on what jargon really translates to in practical terms. 
(PODCAST) READ ABSTRACT |

E-guide: Best practices for reusing data backup tapes by Iron Mountain

August 23, 2012 - (Free Research)
Access this FAQ Guide, full of answers from W. Curtis Preston, to find out what vendors really mean when they quote a tape age, to learn about how to decide when a tape is ready to be discarded and for the scoop on what jargon means in practical terms. 
(EGUIDE) READ ABSTRACT |

The Elephant in the Room - Cloud Security and what Vendors and Customers Need to do to Stay Secure by Rackspace Hosting

May 31, 2011 - (Free Research)
Both vendors and customers share the responsibility of cloud security, and each have their own part to play. This white paper highlights a non-profit organization's findings on the most typical security practices across the cloud computing industry. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: Disk Archive Appliances a Niche Approach to Long-Term Retention by Imation Corp. (E-mail this company)

December 01, 2011 - (Free Research)
There are two basic types of disk archive appliances that offer solutions to companies of all sizes - but the product class is a small one, and projected growth rates are low. Check out this SearchDataBackup.com E-Guide to find out whether or not an archiving appliance is a good fit for your company. 
(EGUIDE) READ ABSTRACT |

Analyst report: vendor of choice for SSDs by Dell, Inc.

November 19, 2013 - (Free Research)
This report outlines enterprise solid state storage and why it matters to customers. It also highlights findings from a study of more than 550 IT professionals on their plans for SSD deployment. Find out what your peers chose as the #1 vendor of choice to deploy flash/SSDs. 
(WHITE PAPER) READ ABSTRACT |

Burning Dollars: Three Myths of Telecom Savings by Dimension Data

December 20, 2013 - (Free Research)
In this white paper, explore 3 telecom savings myths debunked, and how organizations must achieve greater visibility in their networks to differentiate perceived and realized value of their mobile investments. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Data Reduction Methods for Primary Storage: Vendors Push Impacts Market by IBM

August 15, 2011 - (Free Research)
Check out this SearchStorage.com E-Guide to learn what vendors have to offer in this realm of backup technologies now. 
(EGUIDE) READ ABSTRACT |

SSG Report: Dell #1 Vendor of Choice for SSDs by Dell, Inc.

December 16, 2013 - (Free Research)
This report delves into the use cases where solid state storage has tremendous performance advantages and can produce reduced costs due to performance or enable applications that have been near to impossible using HDD technology. 
(WHITE PAPER) READ ABSTRACT |

WAN Clustering FAQ by Riverbed Technology, Inc.

November 20, 2009 - (Free Research)
Please review this presentation transcript featuring Andrew Burton, Editor of SearchDisasterRecovery.com, and Jeff Boles, Senior Analyst with the Taneja Group. The transcript documents their discussion about WAN clustering. Find out exactly what you need to set up a WAN cluster and what vendors offer WAN clustering support. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Magic Quadrant for Application Performance Monitoring by Riverbed Technology, Inc.

January 28, 2014 - (Free Research)
Inside, you’ll find out who the leaders, challengers, visionaries and niche players are in the application performance monitoring (APM) space, with a breakdown of each vendor’s strengths and weaknesses. Read on to discover the 5 functional dimensions required in a solution in order to meet APM objectives. 
(WHITE PAPER) READ ABSTRACT |

The best storage for virtual environments by SearchStorage.com

April 12, 2013 - (Free Research)
Access this eGuide now to discover what vendors are doing to address the problem of IT pros struggling to support storage for virtual environments and which storage works the best in virtual infrastructures. 
(EGUIDE) READ ABSTRACT |

3 Common Cloud Challenges Eradicated with Hybrid Cloud by SearchStorage.com

February 20, 2012 - (Free Research)
Check out this E-Guide for a full understanding of hybrid cloud storage - discover features unique to hybrid cloud products, learn what vendors are in this market space today, and explore three key challenges that can be overcome with a hybrid cloud solution. 
(EGUIDE) READ ABSTRACT |

31% of storage pros choose Dell for flash/SSDs* by Dell India

February 26, 2014 - (Free Research)
View this 1-page resource to see why 31% of storage pros choose this top vendor for flash/SSD deployment. 
(WHITE PAPER) READ ABSTRACT |

Virtualization Security: Achieving Compliance for the Virtual Infrastructure by Trend Micro

December 01, 2009 - (Free Research)
What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more! 
(WHITE PAPER) READ ABSTRACT |

Securing Cloud Computing For Enterprise Collaboration by IntraLinks, Inc

April 21, 2014 - (Free Research)
Consult the following white paper to explore the current state of security in the cloud as well as what you need to look for when selecting an appropriate vendor for your business. Learn about the 4 security areas that need to be covered, tips for getting info from service providers, security check lists, and more. 
(WHITE PAPER) READ ABSTRACT |

Oracle Identity Analytics- A Business Perspective by Oracle Corporation

February 01, 2010 - (Free Research)
This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

July 05, 2011 - (Free Research)
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business. 
(WHITE PAPER) READ ABSTRACT |

The Anatomy of a Vendor Neutral Archive (VNA) Done Right: The Case for Silo Busting by Iron Mountain

September 14, 2011 - (Free Research)
PACs systems are expensive to support and the rising volume of medical image data is outpacing the limited functionality of the traditional PACS archive. So how can healthcare facilities ensure that medical images are securely stored, while meeting EHR compliance requirements? Learn about the storage and data management options available to help. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.

December 10, 2009 - (Free Research)
Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What Are Your Obligations to Retain Email and Other Electronic Content? by EMC Backup and Recovery Solutions

March 23, 2011 - (Free Research)
This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC. 
(WHITE PAPER) READ ABSTRACT |

ESG: Market Landscape Report: Storage Tiering by DataCore Software Corporation

September 19, 2011 - (Free Research)
It's almost impossible to conduct a conversation with a storage vendor without raising the topic of "storage tiering." Along with "virtualisation" and "cloud," it's one of those de rigueur phrases. And, like those other two, storage tiering suffers from an over-exposure that can assume familiarity and understanding where it does not exist. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Pulse E-zine May 2014- Sign of the Times by SearchHealthIT.com

May 07, 2014 - (Free Research)
Though health IT professionals are pushing harder than ever for mobile healthcare, they aren't retiring the tried-and-true communications badge. 
(EZINE) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 25, 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts