I Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
I Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

Increasing EDA Throughput with Intel Xeon Processor 5600 Series by  Intel

April 09, 2010 - Read about Intel IT's testing of the Intel Xeon processor 5600 series that delivered up to 17.3X throughput improvements compared with single-core Intel Xeon processors and up to a 15:1 consolidation ratio by replacing servers based on single-core Intel Xeon processors.


Increasing Energy Efficiency with x86 Servers by  IBM

September 23, 2009 - Increasing energy efficiency with x86 servers. Robert Frances Group (RFG) explains why Intel/IBM is a winning combination.


Increasing Enterprise Data Warehouse Performance, Longevity and ROI with the Vertica® Analytic Database by  Vertica Systems

April 22, 2009 - Today EDWs are commonplace and a necessity if an organization is to remain competitive and successful. This paper describes how its possible to increase the performance and longevity of the Enterprise Data Warehouse by offloading certain analytic workloads from an existing EDW to a Vertica® Analytic Database.


Increasing IT Efficiency in a Dynamic Data Center by  Dell Compellent

April 01, 2010 - This white paper provides a blueprint for a highly efficient and dynamic datacenter using Microsoft® and Compellent technologies. The solution is enabled by Microsoft Virtualisation and the Compellent® Storage Center SAN™ solution.


Increasing Operational Agility: BPM in Telecommunications by  Oracle Corporation

October 31, 2012 - Efficient business processes are the key to success for any company, especially in the telecommunications (Telco) industry. In this informative resource, learn how you can improve Telco business processes and discover the BPM tools necessary to close process gaps.


Increasing Operational Efficiency: enabling end-to-end change by  CA Technologies.

September 01, 2010 - Development and change within the IT infrastructure can be a very demanding and frustrating task. Access this exclusive resource now to learn the value of an automated and centralized end-to-end change management application.


Increasing Performance, Security, and Manageability on Desktops and Notebooks with Intel® Core™2 Processor with vPro™ Technology and Windows® 7 by  Dell, Inc. and Intel®

October 16, 2009 - Technical decision makers are faced with many challenges in today's economy: help users get more work done faster and with fewer difficulties, protect the network and individual systems from attacks or malicious code, and much more. Find out how the Intel Core 2 processor with vPro technology complements the new Windows 7 operating system.


Increasing Productivity by Adopting Testing Best Practices by  Fluke Networks

March 28, 2012 - Discover how you can increase productivity and efficiency by adopting testing best practices for your network.


Increasing Productivity with Mobile Business PCs by  Dell, Inc. and Intel®

March 09, 2011 - After investigating various options, Intel IT selected mobile PCs as the standard computing platform. Mobile business PCs, by nature, are highly portable and their robust feature set provides productivity advantage to employees, while meeting a majority of the company's diverse requirements.


Increasing Profitability with Analytics in Midsize Companies by  IBM

December 26, 2013 - Access the following white paper to uncover a business intelligence and analytics solution that offers the data capabilities of a much large system but only a fraction of the cost. Discover what SMBs stand top gain and how this solution can be deployed quick and efficiently.


Increasing SharePoint Adoption: Unleash Content Access Across the Enterprise by  AvePoint, Inc.

February 21, 2011 - This paper examines how organizations are turning to Microsoft SharePoint to connect their knowledge workers, business processes, and enterprise-wide content. New features in SharePoint Server 2010 are aimed at improving the platform’s scalability and usability, inherently driving the SharePoint deployment to evolve and grow as business dictates.


Increasing the efficiency of case file coordination in social services by  IBM

June 15, 2011 - Social service agencies are experiencing challenges with manual processes. Advanced case management strategies are being implemented to streamline these processes and foster greater insight, collaboration and decision-making capabilities. This white paper explains how one such solution allows you automate these processes to elevate processing.


Increasing the Quality, Efficiency and Accountability of Care: BPM for Health Care Organizations by  Oracle Corporation

April 30, 2013 - BPM helps health plans, healthcare providers, and accountable care organizations (ACOs) manage processes. This solution brief explains how essential business processes such as claims management, eligibility, enrollment, billing, and quality control initiatives can be improved with Oracle BPM technology.


Increasing the ROI of Mobility by  Sybase, an SAP company

May 08, 2009 - Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.


Incremental Updates vs. Full Reload Change Data Capture: Minutes vs. Hours by  CONNX Solutions

June 01, 2008 - This white paper discusses the five different ways to move changed data, including a solution that can free up programming resources, save processing time and more.


Independent Lab Comparative Review by  Avaya

June 15, 2011 - MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities.


Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks by  Cisco Systems, Inc.

May 24, 2004 - Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.


Independent Research Report: Should Your Email Live In The Cloud? An Infrastructure And Operations Analysis by  Oracle Corporation

January 27, 2009 - This Forrester Research report explains how new cloud and hybrid deployment models can help enterprises cope with the infrastructure challenges created by growing email systems. Understand your options for migrating, consolidating, and upgrading your messaging infrastructure and the real cost of keeping or evolving your current email architecture.


Independent Testing Services by  CSC

December 31, 2012 - Application testing is a critical step in the software development lifecycle, especially as application complexity and demand for faster delivery increases. In this resource, discover how end-to-end testing services can provide you with the tools that you need to more efficiently and effectively test your applications.


Indiana University Enrolls SAN Storage for Improved Efficiency and Productivity by  Dell, Inc.

September 01, 2011 - Check out this case study to explore how Indiana University lowered the TCO of IT equipment and improved service offerings through server consolidation and SAN storage.


Indiana University Virtualizes Mission-Critical Oracle Databases by  VMware, Inc.

August 24, 2011 - Access this resource to learn how the Kelley School of Business at Indiana University used virtualization to decrease server deployment time for faculty special projects; reduce amount of physical hardware; and reduce the power consumption across all infrastructure.


Indonesia Stock Exchange halves its hardware investment cost with a Red Hat Solution by  Red Hat and Intel

December 16, 2013 - This brief whitepaper explains how the Indonesian Stock Exchange (IDX) was able to half its hardware costs by leveraging a Linux system to support trading machines, surveillance machines, database engines, and more.


Industrial SOA Series by  Oracle Corporation

October 30, 2013 - Access this resource to read a variety of articles on service-oriented architecture (SOA), on topics ranging from SOA blueprints to SOA mobile solutions.


Industrializing Agile Software Delivery with ALM 2.0+ by  CollabNet

January 19, 2012 - In this webcast learn how  IT departments have increased developer productivity, saved millions, and realized governance by implementing DevOps. ALM 2.0+ fosters integration with operations and accepts tool and platform heterogeneity, helping FT1000 customers worldwide transitioning to DevOps.


Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by  CA Technologies.

July 26, 2010 - Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies.


Industry Briefs: IBM Smart Analytics System by  IBM

March 18, 2011 - 2-page briefs are available for 6 key industries detailing how IBM Smart Analytics System helps address specific business challenges. A 4-page horizontal overview is also available to use across industries.


Industry Intelligence: International Financial Reporting Standards for Hedge Funds by  Advent Software, Inc

January 04, 2010 - This paper introduces hedge funds and hedge fund service providers to IFRS.


Industry Trends & Perspectives - Data Protection for Virtual Server Environments by  Quantum Corporation

August 01, 2008 - This webcast by Quantum technologies highlights the challenges of integrating server virtualization into an existing computing environment and shows you solutions for dramatically improving the efficiency of your backup operation.


Industry-Leading Duo Provides Innovative Cloud Performance and Reliability by  VMware and IBM

February 28, 2014 - Explore this game-changing resource to uncover the key features of a private cloud solution duo, which can provide your users with secure, available-access to your business-critical knowledge – and make virtualized business intelligence a reality for your organization.


Industry’s First Solution That Bridges Management and Analytics by  Extreme Networks

February 18, 2014 - This guide explores Deep Packet Inspection technologies and how it can greatly enhance your network performance when coupled with application performance management.


InfiniBand Software and Protocols Enable Seamless Off-the-shelf Applications Deployment by  Mellanox Technologies

March 01, 2008 - The focus of this article is to discuss what application developers need to know to enable their IP, SCSI, iSCSI, sockets or file system based applications to operate over InfiniBand.


Info-Tech Quality Management and Test Champion Report by  IBM

April 18, 2013 - Today, applications are becoming more and more popular and widespread across on-premise, Web, mobile and cloud domains. As a result, software testing suites have to answer to the demand for enhanced support and usability in dispersed domains. Read this white paper to learn more about how to conduct and scale testing with new developments.


Infoblox Integrated IP Address Management Solution by  Infoblox

February 26, 2007 - In this paper, we will explain the importance of IP address management, discuss the different approaches to implementing IP address management solutions.


Infographic: Can you provide continuous availability? by  EMC Corporation

July 11, 2013 - This resource presents tips about new active-active data centers that offer continuous availability architecture for physical, virtualized and cloud-based environments.


Infographic: Disaster Recovery Trends in 2013 by  FalconStor Software

April 15, 2013 - Check out this one-page infographic that details the top trends in the realm of disaster recovery in 2013. You'll gain insight into: the current landscape, what the future holds, the importance of automated DR and more.


Infographic: Global Payroll Strategy by  Workday

March 24, 2014 - Payroll is a huge challenge for today's global companies. Check out the infographic to learn how the cloud can totally transform your payroll for the best and why there's no better time than now to do it.


Infographic: Storage success in the age of big data by  IBM

September 26, 2013 - This valuable infographic takes a statistical look at big data, and introduces a highly efficient, virtualized and flash optimized storage tool that can help you effectively manage rapid data growth.


Infographics: The Four Fundamentals of Your Workforce by  Workday

March 25, 2014 - For many organizations, more than half of their operating costs are tied to the workforce, yet they don't even have complete data on their own employees. See the infographic to learn how Workday is redefining what it means to manage a global, mobile, and diverse workforce.


Infonetics Research Survey Excerpts by  Fortinet, Inc.

October 31, 2013 - This guide explores some key network security strategies and how your data center networks can benefit from these upgrades.


Infor - ERP VISUAL by  Infor

September 04, 2008 - Infor ERP VISUAL combines affordability and deep functionality, and is ideal for high growth, mixed-mode manufacturers who need a modular solution. Learn why more than 4,000 businesses trust Infor ERP VISUAL to run their operations.


Infor - ERP LN by  Infor

September 04, 2008 - Infor ERP LN is an advanced, easy-to-use ERP solution that brings together a wide range of business functions to serve the needs of leading discrete and project-based manufacturers in industrial industries. Check out this demo for more details.


Infor - ERP SyteLine by  Infor

September 04, 2008 - Infor ERP SyteLine spans the business of manufacturing to align supply with demand and support the business and operational challenges of manufacturers. Download this demo to get a better understanding of how this software can benefit your company.


Infor CRM Epiphany For Consumer Products by  Infor CRM

July 01, 2009 - Infor CRM Epiphany helps you make the most of customer interactions and improve your sales, marketing, and service operations in order to increase loyalty, enhance brand preference, and boost profitability.


Infor CRM Epiphany for Hospitality by  Infor CRM

July 01, 2009 - Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point.


Infor CRM Epiphany for Insurance by  Infor CRM

July 01, 2009 - The market-leading Infor CRM Epiphany suite was designed with the needs of today's insurance companies in mind. It delivers what you need to execute a customer retention and growth strategy by delivering a single view of customer interactions across business.


Infor CRM Interaction Advisor by  Infor CRM

July 22, 2009 - Watch this product demo to learn how Infor CRM Interaction Advisor will fuel organic growth by driving lifetime customer loyalty and increase value at every customer touch point without replacing any existing systems.


Infor Epiphany Brochure by  Infor

December 31, 2012 - This helpful resource introduces one CRM tool that allows you to optimize your customer interactions across all communication channels and glean deeper insight into your customer base.  Read on to learn about the specific benefits this technology offers businesses across all sectors.


Informal Learning: Extending the Impact of Enterprise Ideas and Information by  Adobe Systems, Inc.

April 01, 2008 - Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.


Informatica B2B Data Transformation and Data Exchange by  Informatica

June 14, 2010 - View this webcast and garner further information on Informatica B2B Data Transformation and Informatica B2B Data Exchange


Informatica SWIFT Validation by  Informatica

June 14, 2010 - Financial messages must be validated before being sent across any network for financial data exchange or they may be delayed or rejected. Informatica minimizes these risks with message validation, part of its B2B Data. Use the provided links here to test Informatica SWIFT Validation.


Informatica Ultra Messaging by  Informatica

December 08, 2010 - Legacy messaging technologies lack the performance and flexibility necessary to support today’s computing environments. Attend this webinar to learn how Informatica’s Ultra Messaging technology can help realize up to 10x performance improvements over legacy messaging solutions while dramatically reducing costs and improving deployment flexibility.


Information Agenda Assessment Tool by  IBM

October 07, 2009 - The cost and complexity of managing increasing volumes of data and content, plus the need to provide trusted information to all users, are driving CIOs to rethink approach to information delivery. This quick self-assessment is the first step to find out how IBM's Info Agenda approach can help your company unlock the business value of information.


Information Agenda Assessment Tool by  IBM India Pvt. Ltd

December 13, 2010 - An information agenda can help transform information into a strategic asset to improve business outcomes. This quick self-assessment is the first step to find out how IBM's Information Agenda approach can help your company unlock the business value of information.


Information and Analytics: Enabling Business Optimization by  IBM

April 20, 2010 - Read this paper for an examination of the portfolio of offerings IBM has constructed to help its customers gain competitive advantage from their data by creating an information agenda, building an information platform and applying business analytics.


Information Archive for Email, Files and eDiscovery Demo by  IBM

December 23, 2010 - This video explains how the IBM Smart Archive Strategy meets these challenges head on. Watch this video to learn how the Smart Archive Strategy is a broad strategy that helps organizations leverage IBM’s capabilities to design specific strategic archiving solutions for their unique needs.


Information Classification: Delivering Security and Business Value by  Boldon James

October 10, 2011 - This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.


Information Classification: Information Stewardship in Practice by  TITUS

April 01, 2013 - Information classification is vital for comprehensive information security. This whitepaper discusses the role that information classification plays in information stewardship, and also explains the organizational framework and technologies you need to implement it correctly. Read on to learn more.


Information Connect: Program Management in the Public Interest - Primavera Enterprise Project Portfolio Management Solutions by  Oracle Corporation

October 08, 2009 - Oracle's Primavera enterprise project portfolio management solutions help organizations effectively and efficiently invest their funds for the good of the public.


INFORMATION FOR SUCCESS: Enterprises Standardize on Oracle Database 11g by  Oracle Corporation

September 29, 2011 - This customer reference booklet contains a sample of real business results that organizations around the world, across a variety of industries, have achieved by upgrading and standardizing on Oracle Database 11g.


Information Governance - an Enterprise Imperative (Hurwitz & Assoc) by  IBM

March 17, 2011 - Learn why Hurwitz & Associates deems information governance an imperative for the enterprise in this video featuring Marcia Kaufman.  The video was created for the 2010 Virtual IOD event.


Information Governance - Information is a Strategic Asset (Telkom SA) by  IBM

March 17, 2011 - Hear Komalin Chetty describe how Telkom SA transformed information into a strategic asset through information governance in this video created for the 2010 Virtual IOD event.  Media library link includes a downloadable file and transcript to facilitate translation.


Information Governance for Business Value by  IBM

August 05, 2013 - In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.


Information Governance in Action: Success Factors and Best Practices by  SearchContentManagement

October 09, 2013 - Consult this expert resource to learn more about information governance. It explains why it's a key component of effective content and data management. It outlines how to make the business case for an information governance initiative.


Information Governance is Good Business by  OpenText

August 16, 2013 - View this resource to learn more about big data and the competitive advantage it provides. Forward-thinking organizations use critical business information as a corporate asset that needs to be protected, cost-effectively managed, and leveraged for maximum value to the organization.


Information Governance Online Symposium -- E-discovery and the Cloud by  SearchCompliance.com

November 15, 2011 - The cloud has the potential to radically change e-discovery. Cloud applications can help data integration and reporting, and eliminate redundancy and disparate data management apps in the enterprise. However, the cloud also increases security risks and introduces some loss of data control.


Information Governance Online Symposium -- Next Generation Digital Convergence for All by  SearchCompliance.com

November 15, 2011 - Health care organizations are not alone in their efforts to convert physical records to electronic files. In this two part course, hear little-known insight from John Weathington, recognized author and compliance and risk management expert.


Information Governance Online Symposium 2013 by  SearchCompliance.com

March 07, 2013 - Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.


Information Governance Perspectives from RSD: E-mail Archiving by  RSD

August 17, 2009 - With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions


Information governance strategy: Developing a roadmap and structure for improving corporate information management by  RSD

June 02, 2011 - Access this eBook for practical advice on developing an information governance strategy, including a checklist of what to do – and what not to do – as part of a successful information governance initiative.


Information Governance Survey Results from SearchCompliance.com by  Iron Mountain

April 01, 2012 - Download the results of our 2012 survey on the state of information governance. Find out how decision-makers from IT to records management and compliance rate the value of information governance, the business drivers behind such programs, planned areas of spending and much more.


Information Governance: Audit and Protection on the IBM System z Platform by  IBM

November 30, 2011 - Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures.


Information Governance: Business Imperative or Technology Asset? by  Iron Mountain

May 01, 2012 - In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals.


Information Governance: Buy Now or Pay Later by  CommVault Systems, Inc.

March 05, 2014 - View the following webcast to hear from Gartner Research Inc. as they reveal why companies need to have an information archiving solution to help maintain compliance, reduce IT costs, and more.


Information Governance: Buy Now or Pay Later (6 min clip) by  CommVault Systems, Inc.

February 04, 2014 - View the following webcast to hear from a renowned research firm as they reveal why companies need to have an information archiving solution to help maintain compliance, reduce IT costs, and more.


Information Governance: Orchestrate people, processes and technology for success by  IBM

March 17, 2011 - Not every business has a material supply chain, but all organizations have an information supply chain. It runs through applications, databases and servers, and it ends in an array of ever-changing products that are critical to the health of the organization. Read this white paper to learn more today.


Information governance: Reduce risk and improve compliance by  Iron Mountain

August 29, 2012 - This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.


Information Governance: Why It Matters and How to Drive Success by  Hewlett-Packard Limited

October 31, 2013 - This resource describes the need for a proven, holistic approach to information governance. Read on to learn why governance matters, and learn where to start with your governance strategy in order to reduce risk and cost, improve productivity, and more.


Information is King: Business Analytics in the Age of the Downturn and the (Re)Emergence of the Customer by  SAS

April 07, 2010 - BusinessWeek Research Services (BWRS) launched a research program in April 2009 to determine the attitudes and opinions of C-level executives with regard to the use and value of business analytics. This paper reviews a portion of the research and provides analysis and insights on the topic of business analytics.


Information Lifecycle Governance Dialoginar by  IBM

May 23, 2011 - Soak up valuable Information Lifecycle Governance insights from Randolph Kahn and Frank McGovern.


Information Lifecycle Governance Leader Reference Guide by  IBM

April 30, 2013 - Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.


Information Lifecycle Management in an SAP Environment by  SAP America, Inc.

March 15, 2010 - SAP provides a comprehensive product offering to support you in your Information Lifecycle Management strategy. Learn more about the three cornerstones of ILM, including data archiving/data management, retention management, and retention warehouse. 


Information Management with Oracle Database 11g Release 2 by  Oracle Corporation UK Ltd

October 03, 2011 - In this white paper, learn how to improve your information management, increasing the ability to manage, secure, query, and administer information with high levels of performance. Uncover how Oracle Database 11g Release 2 includes a wide range of capabilities to allow for this intelligent management and analysis.


Information Management: The First Step in the Right Direction by  Symantec Corporation

March 16, 2011 - This white paper from Symantec Corporation takes an in-depth look into some of the information management strategies companies are using today, and the inefficiencies inherent in them. Read on to learn more about what your company can accomplish in the data center through e-discovery events.


Information Optimization Transformation Experience Workshop by  Hewlett-Packard Company

April 12, 2013 - Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management.


Information Optimization Transformation Experience Workshop by  Hewlett-Packard Limited

January 24, 2013 - Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management.


Information Quality Management (IQM): Assessing Your IQM Practice by  Harte-Hanks Trillium Software

March 17, 2011 - Organizations are starting to see the connection between making information available and leveraging it to be more agile and productive. This paper offers a practical guide to assess your information quality maturity level, and provides a framework to align information quality management practices to business objectives and results.


Information Retention and eDiscovery Survey by  Symantec Corporation

October 17, 2011 - This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.


Information Risk: Managing Digital Assets in a new Technology Landscape by  Hewlett-Packard Limited

February 25, 2014 - This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks.


Information Security - IT Decision Checklist: Application Security by  Ounce Labs, an IBM Company

December 31, 2009 - Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.


Information security and compliance services overview by  Dell, Inc.

May 18, 2011 - With new threats emerging and the pressures the meet compliance, your organization is forced to focus more on security and less on strategic projects that drive your business. Access this paper for an overview of security and compliance solutions available to help handle your security issues, freeing your time to focus on growing your business.


Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by  Tripwire, Inc.

May 13, 2010 - This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.


Information Security ANZ March 2014 by  SearchSecurity.com

March 18, 2014 - This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.


Information Security ASEAN March 2014 by  SearchSecurity.com

March 18, 2014 - This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.


Information security breaches survey 2012 by  ComputerWeekly.com

April 24, 2012 - Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.


Information Security Emagazine: Best Practices for the Evolving Threat Landscape by  Hewlett-Packard Limited

December 02, 2013 - In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.


Information Security Essential Guide: The Evolution of Threat Detection and Management by  IBM

May 31, 2013 - This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.


Information Security Ezine- Europe by  SearchSecurity.co.UK

June 02, 2011 - This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.


Information Security IT Decision Checklist: Security Information and Event Management by  ArcSight, an HP Company

July 28, 2011 - This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.


Information Security Magazine by  SearchSecurity.com

February 03, 2014 - In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.


Information Security Magazine - April 2010: Endpoints on the Loose by  Information Security Magazine

April 07, 2010 - This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.


Information Security Magazine - April 2013 by  SearchSecurity.com

April 03, 2013 - This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.


Information Security Magazine - December 2009 / January 2010: Basic Database Security by  Information Security Magazine

December 14, 2009 - This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.


Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession by  Information Security Magazine

February 01, 2009 - Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.


Information Security Magazine - February 2010: Under Control by  Information Security Magazine

February 03, 2010 - Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.


Information Security Magazine - February 2013 by  SearchSecurity.com

February 01, 2013 - In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.


Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by  Information Security Magazine

March 09, 2010 - This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.


Information Security Magazine - March 2013 by  SearchSecurity.com

March 01, 2013 - This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.


Information Security Magazine - October 2009: Security 7 Awards by  Information Security Magazine

October 13, 2009 - The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.


Information Security Magazine - September 2009: Readers’ Choice Awards by  Information Security Magazine

September 15, 2009 - This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.


Information Security Magazine November 2009: Stay in Control by  Information Security Magazine

November 16, 2009 - Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.


Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by  Information Security Magazine

July 21, 2010 - The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.


Information Security Magazine September 2011—Reader’s Choice Awards by  Information Security Magazine

September 01, 2011 - Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.


Information Security Magazine – April 2014 by  SearchSecurity.com

April 01, 2014 - In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.


Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by  Information Security Magazine

December 09, 2010 - This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.


Information Security Magazine – July/August 2013 by  SearchSecurity.com

August 06, 2013 - This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.


Information Security Magazine – June 2010: Laptop Lockdown by  Information Security Magazine

June 16, 2010 - This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.


Information Security Magazine – March 2014 by  SearchSecurity.com

March 03, 2014 - In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.


Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by  Information Security Magazine

October 07, 2010 - This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.


Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by  Information Security Magazine

January 01, 2009 - This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.


Information Security Magazine, July 09: Controlling Privileged Accounts by  Information Security Magazine

July 13, 2009 - This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.


Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by  Information Security Magazine

June 10, 2009 - This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.


Information Security Magazine, May 2009: Automating Compliance by  Information Security Magazine

May 01, 2009 - This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.


Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by  Information Security Magazine

April 20, 2009 - This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.


Information Security Magazine: March 2009 - Sky-High Risk? by  Information Security Magazine

March 20, 2009 - This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.


Information Security Magazine: May 2010 - Data: Do you know where it’s going? by  Information Security Magazine

May 03, 2010 - This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.


Information Security Magazine: “Health Care Data Protection” by  Information Security Magazine

March 15, 2011 - This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.


Information Security Roles and Responsibilities Made Easy by  Information Shield, Inc.

Reducing the total cost of information security services by properly documented roles and responsibilities.


Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks by  Dell SecureWorks UK

February 28, 2011 - This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy.


Information Security, Virtualization, and the Journey to the Cloud by  Trend Micro, Inc.

October 20, 2010 - With visible virtualization leadership, commitment, and cooperation, VMware and Trend Micro should be amongst the top choices as CIOs and CISOs choose their partners for their own cloud journeys. Read this paper to find out so much more.


Information Security: Insider edition by  TechTarget

April 18, 2014 - Keeping your organization's Web presence safe is a difficult task, especially with recent threats against Web applications. Simply take this 2 min survey and learn how you can help application developers acquire the necessary security tools and training to keep your Web presence protected!


Information spring cleaning: Organize and optimize your environment for an upgrade to Microsoft Exchange Server 2010 with EMC SourceOne by  EMC Corporation

March 26, 2010 - This white paper is jointly produced by EMC and Microsoft to outline the benefits of archiving your Exchange environment before upgrading to Exchange 2010.


Information Workplace Platforms: Oracle Vs. Microsoft by  Oracle Corporation

October 01, 2008 - Read this white paper to learn about Oracle and Microsoft workplace platforms strengths and weaknesses.


Information-led Transformation Planning, Modeling and Building New Intelligence Applications by  IBM

March 24, 2011 - This white paper discusses: What is an industry model? What is the value of industry models? Considerations for building or buying data models IBM Industry Models—business and technical blueprints Reducing time to value with IBM Industry Models


Informix Active Clustering E-Book by  IBM

June 07, 2010 - Read this e-book for an exploration of the four advantages of clustering, including data redundancy and parallel processing, and such benefits as high availability, rapid scalability, flexibility and maximum resource utilization.


Infosecurity Europe 2014 by  ComputerWeekly.com

February 24, 2014 - Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today!


InfoSphere BigInsights for Hadoop Quick Start Edition by  IBM

October 31, 2013 - This resource introduces a platform that takes the pain out of Hadoop, empowering your organization to tap into large pools of data and achieve faster, smarter decision-making.


InfoSphere Data Explorer - Vivisimo, an IBM Company by  IBM

October 12, 2012 - To extract the most value from data, you need to sort through structured and unstructured data from a variety of sources - and that isn't easy. In this resource, discover how a data exploration tool enables you to improve access to information across your enterprise, and easily visualize and integrate big data for more efficient analytics.


InfoSphere MDM Solution for Product Information Management by  IBM

November 15, 2011 - Watch this short video and learn how leading retailers, distributors and manufacturers leverage IBM InfoSphere Product Information Management solutions to boost supply chain productivity and deliver an optimal customer purchase experience.


InfoSphere Optim Data Growth Solution for Application Retirement by  IBM

August 23, 2011 - Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information.


InfoSphere Optim Data Redaction by  IBM

August 23, 2011 - As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information?  In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts