Where Can I Find An Abstract On Security Management And Change ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Where Can I Find An Abstract On Security Management And Change Management returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Storage Management
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Data Security
 •   Endpoint Security
 •   Network Management
 •   Enterprise Systems Management
 •   Storage Security

Related Searches
 •   Billing Where
 •   Designer Where
 •   E-Commerce Where Can
 •   Online Where Can I
 •   Risk Where Can
 •   Roi Where Can I
 •   Starting Where Can I
 •   Test Where Can
 •   Video Where Can I
 •   Where Minnesota
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Leveraging the Power of the Peloton to Lead Change by Global Knowledge

July 19, 2013 - (Free Research)
This white paper combines the concept of the peloton with one of the most widely accepted approaches for enabling change in organizations: John P. Kotter's 8 Steps for Enabling Change. 
(WHITE PAPER) READ ABSTRACT |

An Introduction to Windows Server 2008 Server Manager by Global Knowledge Network, Inc.

January 2008 - (Free Research)
This white paper introduces the Server Manager console and will help you find your way around it, so that you can get up to speed with Server 2008 quickly. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution E-Zine: Building the Infrastructure to Enable the Changing Face of IT by SearchNetworking.com

January 2011 - (Free Research)
This issue of the Network Evolution E-Zine will cover the road to flat Data Center network architecture and more. 
(EZINE)

Network Evolution E-Zine: Building the infrastructure to enable the changing face of IT by SearchNetworking.com

December 2010 - (Free Research)
This issue of the Network Evolution E-Zine will cover the road to flat Data Center network architecture and more. 
(EZINE)

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

Access Control in Virtual Environments by FoxT

June 2008 - (Free Research)
The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Managing IT Complexity-- A CIO Roundtable Discussion by ASG Software Solutions

August 2010 - (Free Research)
Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Managing IT Complexity: A CIO Roundtable Discussion by ASG Software Solutions

August 2010 - (Free Research)
Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations. 
(WEBCAST) READ ABSTRACT |

Embracing the Cloud: Top Seven Imperatives for an Organization by Wipro Technologies

March 2009 - (Free Research)
This paper analyzes the impact of the cloud on the IT Ecosystem and provides answers to what an organization needs to do in embracing a right cloud strategy. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

Maximize Your Storage Spend by Doing More with Less - Transcript by Red Hat

February 2012 - (Free Research)
Download this presentation transcript to discover how to free yourself from vendor lock-in by expensive proprietary storage hardware companies, and learn how you can take advantage of today's new wave of storage buying. Find out how you can do more with your existing storage and spend less time and money to accommodate changing workloads. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly 11 October 2011: Download this week's issue of the UK's leading technology publication, featuring the latest news, analysis and opinion on the big trends in IT by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we find out how mainframe technology that was meant to be dead and buried is finding innovative new applications. We analyse the challenges facing the government's largest deployment of agile software development, and our Buyer's Guide highlights the firms making the most of social media. Download the new issue now. 
(EZINE) READ ABSTRACT |

CW Buyer's Guide: Software-defined networking by ComputerWeekly.com

April 2013 - (Free Research)
Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World by Symantec Corporation

June 2012 - (Free Research)
Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

Emerging Media Series: How Blogs and Real Simple Syndication (RSS) Impact B2B Technology Purchase Decisions by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
This report, the second in a series of studies looking at the impact emerging online applications have on B2B technology marketing, finds that blogs and Real Simple Syndication (RSS) are catching on more quickly than previously thought. 
(ANALYST REPORT) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2009 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST NEWS) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2005 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST REPORT)

Electronically Stored Information (ESI) Risk Management Part I - Best Practices by Renew Data Corp.

March 2008 - (Free Research)
It is important for IT and Legal agree on how litigation requirements impact corporate information systems. This paper focuses on the requirements placed on IT and discusses solutions for proactively managing electronically stored information. 
(WHITE PAPER) READ ABSTRACT |

IBM System x Enterprise Servers in the New Enterprise Data Center by IBM

February 2009 - (Free Research)
IBM System x enterprise servers in the new emerging data center targets virtualization and consolidation, database, and enterprise applications, while focusing on performance, reliability, and manageability. This means better value for your IT dollar. 
(ARTICLE)

Greater Business Agility with Network Virtualization Overlays by Dell, Inc.

December 2013 - (Free Research)
This white paper highlights a top vendor's network virtualization overlays solution that abstracts physical networks while facilitating network virtualization. 
(WHITE PAPER) READ ABSTRACT |

Leadership with Video Communications by Cisco Systems, Inc.

November 2013 - (Free Research)
This exclusive whitepaper covers the value of adding unified communications with video capabilities to a mid-market business. 
(WHITE PAPER) READ ABSTRACT |

Enterprise VoIP Security: Potential Threats and Best Practices by Global Knowledge Network, Inc.

March 2006 - (Free Research)
As VoIP usage becomes widespread, enterprise users will become subject to many of the same security risks that have affected data networks. This report highlights some of the potential security problems associated with VoIP and address what measures can be taken to secure enterprise VoIP deployments. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts