EMC CorporationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for company name: EMC Corporation returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Content Management (ECM)
 •   Business Process Management (BPM)
 •   Document Management
 •   Storage Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disk-based Backup & Storage/ RAID
 •   Records Management
 •   Media & Digital Asset Management
 •   Data Security
 •   Email Archiving

Advertisement

ALL RESULTS
1 - 25 of 239 | Next Page

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool by EMC Corporation

December 31, 2013 - (Free Research)
Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Signature-less Malware Detection: Finding an Evil in the Haystack by EMC Corporation

December 31, 2012 - (Free Research)
Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats. 
(WHITE PAPER) READ ABSTRACT |

Stalking the Kill Chain by EMC Corporation

October 31, 2012 - (Free Research)
Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb. 
(WHITE PAPER) READ ABSTRACT |

The Critical Incident Response Maturity Journey by EMC Corporation

December 31, 2013 - (Free Research)
This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. 
(WHITE PAPER) READ ABSTRACT |

From SIEM to Security Analytics: The Path Forward by EMC Corporation

December 31, 2012 - (Free Research)
Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis. 
(WEBCAST) READ ABSTRACT |

Maximum-Strength Threat Detection for Mid-Size Enterprises by EMC Corporation

December 31, 2012 - (Free Research)
This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small. 
(WEBCAST) READ ABSTRACT |

The Forrester Wave™: File Sync And Share Platforms by EMC Corporation

July 31, 2013 - (Free Research)
This report and accompanying spreadsheet detail the findings about how well each file sync and share vendor scores based on Forrester's criteria and where they stand in relation to each other. Read on to discover more! 
(WHITE PAPER) READ ABSTRACT |

EMC Syncplicity With EMC Isilon by EMC Corporation

December 31, 2013 - (Free Research)
This resource gives insight into the new strategies for the always on business world and highlights the benefits of an enterprise-grade file sync and sharing solution. 
(WHITE PAPER) READ ABSTRACT |

CIO Top Of Mind For 2013 by EMC Corporation

December 31, 2012 - (Free Research)
This short resource gives survey results from over 600 CIOs and tells what they think about the biggest trends in storage today. 
(WHITE PAPER) READ ABSTRACT |

A Roadmap for Big Data in Security Analytics by EMC Corporation

December 31, 2012 - (Free Research)
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges. 
(WHITE PAPER) READ ABSTRACT |

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats by EMC Corporation

September 30, 2012 - (Free Research)
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. 
(WHITE PAPER) READ ABSTRACT |

The Big Data Security Analytics Era is Here by EMC Corporation

January 31, 2014 - (Free Research)
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. 
(WHITE PAPER) READ ABSTRACT |

IAM Buyer's Guide: 5 Key Questions to Ask by EMC Corporation

April 10, 2014 - (Free Research)
This buyer's guide gives answers to 5 key questions that need to be asked before choosing an IAM solution. The questions range from the benefits of IAM solutions to suitability concerns. 
(WHITE PAPER) READ ABSTRACT |

The CISO's Guide to a Full Night's Sleep by EMC Corporation

April 10, 2014 - (Free Research)
This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance. 
(WHITE PAPER) READ ABSTRACT |

A Day in the Life of an IAM Program Manager by EMC Corporation

April 10, 2014 - (Free Research)
This brief resource breaks down the challenges of identity and access management and highlights how one solution can help automate certain aspects of the work to save time and improve efficiency. 
(WHITE PAPER) READ ABSTRACT |

Solving SIEM Problems with Security Analytics by EMC Corporation

January 31, 2013 - (Free Research)
The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM. 
(WHITE PAPER) READ ABSTRACT |

Implementing a Security Analytics Architecture by EMC Corporation

December 31, 2012 - (Free Research)
This guide explores the inabilities in traditional security management and how advanced threats are growing even more sophisticated. 
(WHITE PAPER) READ ABSTRACT |

Building An Intelligence - Driven Security Operations Center by EMC Corporation

February 28, 2013 - (Free Research)
Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security. 
(WHITE PAPER) READ ABSTRACT |

Financial Institutions, Merchants, and the Race Against Cyberthreats by EMC Corporation

October 31, 2013 - (Free Research)
Access this informative, in-depth white paper and discover why financial institutions and merchants are the most common targets for cyber-attacks, and what steps these businesses can take to protect themselves against attacks. 
(WHITE PAPER) READ ABSTRACT |

Consumer Web Portals: Platforms at Significant Security Risk by EMC Corporation

December 31, 2013 - (Free Research)
This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience. 
(WHITE PAPER) READ ABSTRACT |

EMC Scaleio: For High-Performance Computing by EMC Corporation

December 30, 2013 - (Free Research)
Sophisticated systems require an environment that is capable of handling high-performance computing (HPC). Fortunately, there is a self-managed storage architecture available which can provide the elasticity, resilience and management needed for HPC to run smoothly. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

EMC Scaleio: For Development and Testing by EMC Corporation

December 26, 2013 - (Free Research)
This whitepaper discusses a storage solution that can help eliminate dependence on complex, expensive external SAN storage and fabric by leveraging a robust, high-performance shared virtual SAN. 
(WHITE PAPER) READ ABSTRACT |

Backup and Recovery Made Simple with EMC NetWorker by EMC Corporation

December 20, 2006 - (Free Research)
Centralize, automate and accelerate your data backup and recovery. Download this white paper and learn how to securely manage and protect your critical business data. 
(WHITE PAPER) READ ABSTRACT |

Detecting Sophisticated Online Attacks with Streaming Analytics by EMC Corporation

December 31, 2013 - (Free Research)
Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Business Continuity Management Planning Software by EMC Corporation

August 26, 2013 - (Free Research)
Access this informative, in-depth resource for a market snapshot of BCMP vendors that may be appropriate for your organization's budget and needs. 
(RESOURCE) READ ABSTRACT |

1 - 25 of 239 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts