White Papers Plan Security ProjectWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Papers Plan Security Project returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Enterprise Resource Planning (ERP)
 •   Network Security
 •   Virtualization
 •   Backup Systems and Services
 •   Storage Management
 •   Security Monitoring
 •   Endpoint Security
 •   Security Policies

Related Searches
 •   Examples Of White
 •   General White
 •   Metrics White Papers Plan
 •   Part White Papers Plan
 •   Related White
 •   Specialist White
 •   Templates White
 •   White India
 •   White Papers Maine
 •   White Papers Sales
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Building a Robust Business Case for High Quality Master Data by Melissa Data Corp

February 01, 2010 - (Free Research)
This white paper explains the key elements for building a proper, quantified business case. It presents the measures that are favored by corporate finance departments, and helps develop a strong business case for data quality and MDM projects. A number of real-life examples with quantifiable benefits are also included. 
(WHITE PAPER) READ ABSTRACT |

How to Choose a Distribution System by Sage Software

January 05, 2012 - (Free Research)
Read this white paper to learn best practices for selecting the best distribution strategy and accompanying enterprise resource planning (ERP) software for your organization. 
(WHITE PAPER) READ ABSTRACT |

HP Data Protector 6.2 software integration with HP 3PAR Storage System by HP

September 26, 2011 - (Free Research)
This white paper provides detailed information on how to integrate HP Data Protector software with HP 3PAR Storage Systems. The solution is based on Data Protector Zero Downtime Backup concept. The 3PAR InServ version mentioned and tested here is 2.3.1. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Project Portfolio Management by Innotas

June 01, 2012 - (Free Research)
Access this white paper to uncover how cloud-based portfolio project management (PPM) strategies are changing the way CIOs and IT teams are viewed by the business. Gain insight into PPM best practices and real world of examples of how PPM keeps you on time, budget, quota, and target. 
(WHITE PAPER) READ ABSTRACT |

Navigating Backup and Recovery in VMware Environments - Technical White Paper by HP

July 22, 2011 - (Free Research)
This white paper explores the problems faced by IT administrators when managing the physical and VMware virtual infrastructure, and shows how HP Data Protector simplifies backup and recovery. 
(WHITE PAPER) READ ABSTRACT |

Removing the Barriers to IT Governance: How On-Demand Software Changes the Game by Innotas

September 01, 2009 - (Free Research)
IT governance has a well-deserved reputation for being extremely complicated, expensive, and time-consuming. But today’s CEOs and governing boards expect accountability, strategic alignment, cost saving, and contributions to overall growth from IT departments, all of which can be facilitated by IT governance. 
(WHITE PAPER) READ ABSTRACT |

A holistic approach to your BYOD challenge by Insight

May 10, 2013 - (Free Research)
Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend. 
(WHITE PAPER) READ ABSTRACT |

FalconStor® RecoverTrac™: Automated Service-oriented Disaster Recovery by FalconStor Software

February 04, 2013 - (Free Research)
This white paper explores a disaster recovery solution that gives you peace of mind by removing complexity from the equation. Read on to get a detailed account of FalconStor's RecoverTrac technology and how it can help you address a full range of disaster recovery challenges. 
(WHITE PAPER) READ ABSTRACT |

Why Should Companies Take a Closer Look at Business Continuity Planning? by Datalink

May 26, 2010 - (Free Research)
Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise. 
(WHITE PAPER) READ ABSTRACT |

10 Ways Excel Drives More Value From Your SAP® Investment... While Making Your SAP Life Easier by Winshuttle, LLC

August 31, 2010 - (Free Research)
This white paper highlights 10 ways Winshuttle's tools and applications utilize Microsoft Office applications and allow you to optimize your SAP investment. The benefits outlined in this white paper are realized by the reduction of SAP operational costs, delivering across the board efficiencies and accelerating top and bottom line improvements. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 11, 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

EMC VSPEX End User Computing Solutions With VMware vSphere and VMware View by OnX USA LLC

June 29, 2012 - (Free Research)
This short white paper explores a storage infrastructure that eliminates the planning and configuration burdens that are associated with adopting an end-user computing solution. 
(WHITE PAPER) READ ABSTRACT |

Secure and Effective Data Extraction from the SAP® ERP System by Winshuttle, LLC

December 2008 - (Free Research)
This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security. 
(WHITE PAPER) READ ABSTRACT |

Data Protection for Virtual Server Environments: Exploring Options and Technologies for Backup and Recovery of Virtual Machines by Datalink

November 2008 - (Free Research)
This white paper provides practical advice and considerations surrounding backup and recovery of virtual server infrastructures. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Streamline, Speed and Secure the Supply Chain With Managed File Transfer by SEEBURGER

December 2011 - (Free Research)
Your enterprise has invested heavily in SAP. But data exchange restrictions caused by large data files, FTP spaghetti and unreliable network connections create long waits, limit your ability to send and receive information, and raise costs and risks. Read this paper to find out how Managed File Transfer ensures your data flow is secure and speedy. 
(WHITE PAPER) READ ABSTRACT |

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow by Sendmail, Inc.

October 2008 - (Free Research)
This white paper examines the architecture limitations prevalent in today's large-enterprise email networks. 
(WHITE PAPER) READ ABSTRACT |

Top Reasons why Customers Virtualize their Desktop Infrastructures with EMC VSPEX by OnX USA LLC

July 2012 - (Free Research)
Access this concise resource to discover ten ways adopting proven virtual infrastructures can help you accelerate and support VDI and cloud computing initiatives, while cutting storage and bandwidth costs. 
(WHITE PAPER) READ ABSTRACT |

IP Networking and Its Impact on Video Surveillance by NETGEAR Inc.

October 2010 - (Free Research)
Video surveillance is critical for business. Different organizations use video surveillance to protect people’s safety, protect valuable assets, or minimize risks associated with criminal activity. One of the biggest trends in surveillance is the accelerating shift to IP from analog. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Securing your Online Data Transfer with SSL by Thawte Inc.

July 2012 - (Free Research)
This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server. 
(WHITE PAPER) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by Core Security Technologies

October 2013 - (Free Research)
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts