Whitepapers On Security ResellerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Whitepapers On Security Reseller returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Routers
 •   Networks
 •   WAN/ LAN Solutions
 •   Endpoint Security
 •   Virtualization
 •   Anti-Virus Solutions

Related Searches
 •   Architecture Whitepapers
 •   Offices Whitepapers On
 •   Policies Whitepapers
 •   Whitepapers Analyst
 •   Whitepapers Collection
 •   Whitepapers On Costs
 •   Whitepapers On Objectives
 •   Whitepapers On Program
 •   Whitepapers On Security Evaluation
 •   Whitepapers On Security Rfq
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

LTO – Whitepapers, Presentations, and Webinars by The LTO Program

June 13, 2013 - (Free Research)
This online resource provides 360-degree insights in the form of whitepapers, expert presentations and webinars that reveal why tape remains a viable option for backing up your data. 
(MICROSITE) READ ABSTRACT |

Sustainability and the Cloud: The Global Environmental Benefits of IT Hosting and Cloud Technology by Rackspace Hosting

April 25, 2011 - (Free Research)
Through this year-long series of whitepapers and webinars, independent analyst Ben Kepes will be building a cloud computing curriculum designed for technologists and non-technical users alike. 
(WHITE PAPER) READ ABSTRACT |

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.

April 11, 2011 - (Free Research)
Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore. 
(WHITE PAPER) READ ABSTRACT |

Developers and Identity Services - Tackling Identity Data with Identity Hub by Oracle Corporation

February 13, 2009 - (Free Research)
This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers. 
(WHITE PAPER) READ ABSTRACT |

Engaging Your Subscribers Using Interactive Media in Email by Bronto Software

October 2008 - (Free Research)
This paper reviews the best practices for integrating engaging interactive media elements into your current email marketing program. It will cover video in email, utilizing polls, flash presentations, RSS feeds and more. 
(WHITE PAPER) READ ABSTRACT |

Say Goodbye to DIY Data Centers: An Infrastructure-as-a-Service Intensive by Rackspace Hosting

April 2011 - (Free Research)
Through this year-long series of whitepapers and webinars, independent analyst Ben Kepes will be building a cloud computing curriculum designed for technologists and non-technical users alike. 
(WHITE PAPER) READ ABSTRACT |

IT Manager Toolkit by AtTask

January 2012 - (Free Research)
Learn what other IT managers are doing to better understand and organize their work. This free toolkit includes whitepapers, webcasts, and videos that help answer the important questions: What's really going on? Are we on time? When will it be done? 
(RESOURCE CENTER) READ ABSTRACT |

Project Manager Toolkit by AtTask

January 2012 - (Free Research)
Learn what other project managers are doing to increase team productivity and maximize resources by downloading this free toolkit from AtTask.  This collection of whitepapers, webcasts, and success stories will provide you with insights and best practices to help you increase productivity, reduce costs, and ensure project success. 
(RESOURCE CENTER) READ ABSTRACT |

Manage Risk and Address Return on Investment with IBM Compliance Solutions by IBM Software Group

February 2008 - (Free Research)
Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls. 
(WHITE PAPER) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Pod Slurping - An Easy Technique for Stealing Data by GFI Software

March 2008 - (Free Research)
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches. 
(WHITE PAPER) READ ABSTRACT |

Operations Energy Management: From Data Center through Facilities by CA Technologies.

December 2008 - (Free Research)
Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center. 
(WHITE PAPER) READ ABSTRACT |

The Corporate Threat Posed by Email Trojans by GFI Software

March 2008 - (Free Research)
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans. 
(WHITE PAPER) READ ABSTRACT |

Why One Virus Engine Is Not Enough by GFI Software

March 2008 - (Free Research)
This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time. 
(WHITE PAPER) READ ABSTRACT |

Why Bayesian Filtering Is the Most Effective Anti-spam Technology by GFI Software

March 2008 - (Free Research)
This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

Podcast - Eight Rules for Creating Great White Papers by KnowledgeStorm, Inc (E-mail this company)

March 2006 - (Free Research)
White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This podcast outlines eight key steps to take when writing a white paper and what you should do once the paper is written. 
(PODCAST) READ ABSTRACT |

Eight Rules for Creating Great White Papers by KnowledgeStorm, Inc (E-mail this company)

May 2005 - (Free Research)
White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This paper outlines eight key steps to take when writing a white paper and what you should do once the paper is written. 
(WHITE PAPER) READ ABSTRACT |

The Changing Face of Network Management by CA Technologies.

April 2008 - (Free Research)
Automated network change and configuration management tools provide numerous benefits. Independent NCCM tools, however, are not enough on their own. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Why Organizations Need to Archive Email by GFI Software

March 2008 - (Free Research)
Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization. 
(WHITE PAPER) READ ABSTRACT |

Going Green. A Strategic Guide to Green IT Management. by CA Technologies.

December 2008 - (Free Research)
Learn how employing enterprise IT management software solutions as part of your green IT strategy advances your overall sustainability goals. 
(WHITE PAPER) READ ABSTRACT |

MicroScope January 2014: A special issue looking at software defined networking by SearchSecurity.com

January 2014 - (Free Research)
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres 
(EZINE) READ ABSTRACT |

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services by GlobalSign

March 2011 - (Free Research)
This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips to Keep Your Small Business Safe by Trend Micro, Inc.

November 2010 - (Free Research)
Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts