S Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
S Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
 

SearchExchange.com eGuide: Moving from Exchange 2003 to Exchange 2010 in 12 steps by  IBM


September 01, 2011 - So you've decided that Exchange Server 2010 is the way to go? After you've done all your homework and reviewed the prerequisites of moving completely off of Exchange 2003 and onto Exchange 2010, this tutorial will guide you through the migration process in just 12 steps. Sound impossible? Roll up your sleeves and find out.

 

SearchManufacturingERP.com eBook: Improving effectiveness and adoption in ERP procurement to drive increased savings by  Ariba, Inc.


December 29, 2011 - This e-book provides tips on how to increase the value of your ERP – and your supply chain – with tools for more effective collaboration.

 

SearchManufacturingERP.com Tip Guide: E-Sourcing tools to help turn strategic suppliers into partners by  Ariba, Inc.


February 08, 2012 - Read this guide to learn best practices to become strategic partners with your suppliers and understand how a sourcing strategy can make or break a company.

 

SearchManufacturingERP.com Tip Guide: Manufacturing Social Media Software: Where it Makes Sense by  Ariba, Inc.


February 08, 2012 - Facebook, Twitter, and LinkedIn have taken social media by storm, but widespread adoption of social networking systems in manufacturing has not taken off. In this guide, learn best practices for implementing social media software and highlights of the business benefits provided.

 

SearchOracle eGuide: Upgrading to Oracle EBS R12 by  Panaya, Inc.


March 06, 2012 - Read this e-guide to discover what challenges to expect when embarking on an E-Business Suite (EBS) R12 upgrade and strategies for overcoming them. Learn why an EBS upgrade is important, uncover new features of R12, and figure out how long your upgrade might take.

 

SearchSAP.com E-Book: SAP upgrade tips and best Practices by  datango AG


November 03, 2010 - SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it all the more difficult to make a case for a technical SAP ERP upgrade. But maintaining upgrade best practices and avoiding mistakes can help avoid costly downtime and issues during upgrade projects.

 

SearchSecurity Survey Reveals Top 5 Enterprise Mobile Security Issues by  SearchSecurity.com


September 20, 2013 - This expert guide examines the top five enterprise security issues that plague organizations today. Some are as simple as lost devices, but others are active threats you need to be prepared for.

 

SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development by  IBM


August 23, 2011 - Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them.

 

SearchSecurity.com E-Guide: Balancing compliance with information security threat assessment by  IBM


September 20, 2011 - While compliance regulations and standards have improved information security, they have also created unique challenges when it comes to adequately securing the organization. This expert tip offers authoritative, technical advice on how to balance compliance with your information security threat assessment.

 

SearchSecurity.com E-Guide: Database monitoring best practices: How to use DAM tools by  IBM


August 11, 2011 - Protecting databases and the data they contain is a challenging task for every IT security professional. This expert e-guide provides best practices for database activity monitoring and explains a step by step process for prioritizing data and protecting transactions.

 

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools by  IBM


August 25, 2011 - Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.

 

SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization by  IBM


August 24, 2011 - Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis.

 

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program by  IBM


August 25, 2011 - This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

 

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2 by  IBM


September 20, 2011 - This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization.

 

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes by  IBM


August 24, 2011 - This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.

 

SearchSecurity.com E-Guide: The critical role of privileged account management in data security by  IBM


August 23, 2011 - Privileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts.

 

SearchServerVirtualization.com EGuide: The Guide to Running Windows on Xen by  Novell, Inc.


March 06, 2007 - Virtualization has the power to consolidate server rooms and extend the life of hardware investments. This E-Guide from SearchServerVirtualization.com provides a comparison of the leading virtualization platforms: Xen, Virtual Server and VMware.

 

SearchSoftwareQuality.com E-Guide: ALM and Requirements Management by  SAP America, Inc.


May 30, 2012 - Read this expert e-guide to explore collaborative practices that agile teams are using to minimize requirements churn and become familiar with some of the commercial and open source requirements management tools available today.

 

SearchSoftwareQuality.com E-Guide: Best Practices for Testing and QA by  SAP America, Inc.


May 25, 2012 - This expert e-guide teaches QA managers ten things to know for successful configuration testing and provides guidance for overcoming five common hurdles of dealing with QA-reluctant CIOs.

 

SearchSoftwareQuality.com eBook: Best practices for ALM portfolio management by  IBM


September 01, 2011 - Read this e-book to learn software development best practices concerning portfolio management, Agile application lifecycle management (ALM), and project and portfolio management (PPM).

 

SearchSoftwareQuality.com eGuide: CMMI for development: An overview of a process improvement model by  IBM


August 15, 2011 - Don't miss this e-guide, expertly compiled by SearchSoftwareQuality.com, to learn the basics of CMMI and it's best use cases in today's enterprise environment.

 

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by  IBM


September 01, 2011 - Read this expert Tip Guide for workable, profitable embedded software development best practices.

 

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by  IBM India Pvt. Ltd


September 01, 2011 - Read this Tip Guide to discover workable, profitable best practices for embedded software development.

 

SearchSQLServer.com E-Guide: SQL Server Performance and Consolidation by  SearchSQLServer.com


January 26, 2007 - SQL Servers in large data centers that are not coordinated and managed leave administrators scrambling to increase utilization. Download this E-Guide from SearchSQLServer.com contributors and PolyServe to learn about solutions that solve this problem.

 

SearchSQLServer.com Handbook: Striking It Rich? SQL Server Joins the Rush to Harness, Analyze Big Data by  Sybase, an SAP company


August 07, 2012 - Microsoft has worked to address the big issue of "big data," as companies are dealing with a constant influx of digital information. SQL Server is no exception, and Microsoft has given its enterprise database a big data makeover. This e-book takes a close look at SQL Server 2012 and finds out why some DBAs are flocking to it—and why others aren't.

 

SearchStorage eGuide: A smarter approach to data protection: 4 best practices by  IBM


May 12, 2011 - There's a big difference between backup and business continuity. When it comes to protecting business critical information, the digital era has brought with it exposure to more threats from more directions than ever before. Download this SearchStorage.com E-Guide to learn all about protecting the use of information and data files.

 

SearchStorage.com E-Guide: Efficient Storage Management by  IBM


September 02, 2011 - In this E-Guide from SearchStorage.com, you’ll find detailed information on data reduction, compression, deduplication, and other technologies that are designed to make better use of your data storage and help you become a better storage manager.

 

SearchStorageUK Essential Guide to Backup by  SearchStorage.co.UK


May 08, 2012 - Check out this expert E-Guide to discover the current state of backup, and learn about today's newest available data protection, virtualization and backup technologies.

 

SearchSystemsChannel.com eGuide: Server Migration for the Midmarket by  IBM


August 15, 2011 - Server migration can be a daunting process for your customers, especially if they do not have a solid plan in place before they begin. This expert e-guide offers best practices to help your clients embark on their server migration projects and ensure a smooth transition.

 

SearchSystemsChannel.com eGuide: VAR Guide to Storage for Virtual Servers by  IBM


August 15, 2011 - This expert e-guide, brought to you by SearchSystemsChannel.com, explores the storage challenges that frequently accompany server virtualization. Gain insight into best practices your customers can implement to ensure optimal storage performance and the success of their virtual environments.

 

SearchSystemsChannel.com eGuide: Virtual Server Management Guide for VARs by  IBM


August 15, 2011 - Virtual systems management is a major new opportunity for VARs provided that it is implemented correctly. This expert e-guide explores the fundamentals of virtual systems management from a reseller's perspective and explains how it can allow customers to fully leverage their virtual environments.

 

SearchVirtualDataCentre.co.UK e-zine, Vol. 1 : Making the Case for a Greener Data Centre by  SearchVirtualDataCentre.co.UK


April 08, 2011 - New mandatory initiatives have recently come into play in the U.K., pushing the idea of “greening up” the data centre higher on every companies’ priority list. Volume 1 of the Virtual Data Centre e-zine gives an overview of how these environmental regulations affect U.K. businesses and what can happen if they don’t comply.

 

SeatonCorp Delivers Low Cost, High Reliability Virtual Desktops via Quest vWorkspace by  Dell Software


June 26, 2009 - Read this case study to see how the benefits of Quest® Software's vWorkspace helped SeatonCorp achieve lower cost, enhanced capabilities, higher reliability, easier management and easier end-user IT support.

 

Seattle Children's Hospital turns Big Data into better care by  IBM


November 25, 2013 - Data integration is the answer for modern organizations dedicated to providing better service. Listen to this webcast case study to learn how integrating data can help get simple questions answered quickly so that organizations can then ask more complex questions and enhance their capabilities.

 

Seattle Children’s increases productivity 130% and saves $1.5 million by  Nuance


October 16, 2013 - This brief video shows how a Seattle-based hospital transcribes documents at 410 lines/hour – or 19 million lines of transcription a year – and saves about $1.5M.

 

Second 'Annual Cost of Cyber Crime' Study by  ArcSight, an HP Company


August 03, 2011 - This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

 

Secrets of a Great API: Core principles for delivering successful APIs by  MuleSoft


April 28, 2014 - Application programming interfaces (APIs) offer tremendous value to modern companies as they can enhance developer productivity, help monetize digital assets, and add value to the business by allowing developers to enhance your services. This informative resource uncovers four secrets of building a stellar API.

 

Secrets of Effective Web Content Management by  Limelight Networks, Inc.


November 07, 2012 - Your Web presence is vital to future success, but what was once considered a well-designed website is a thing of the past. Read this essential guide to learn how mobility and customer relationship management (CRM) are impacting web content management (WCM) best practices and find out how to select the right WCM system.

 

Secrets of Successful Self Service BI by  SearchBusinessAnalytics


February 05, 2013 - In today's fast-paced atmosphere, consumers want their information to be available instantly. View this white paper to learn more about how you can give business users easy-to-use BI tools and let them complete their own data anaylsis and reports. Find out how you can provide BI teams the use of self-service applications by reading this resource.

 

Secrets to Shrinking Your Storage for VMware by  NetApp


December 19, 2008 - VMware has drastically increased storage capacity requirements, but deduplication functionality can help reverse this effect. Read this white paper to learn how real IT shops have managed to achieve space capacity savings in the virtualized data center.

 

Secure Agile Development with HP Quality Center and Application Security Center by  Hewlett-Packard Company


February 15, 2010 - This white paper show you how to gain effective, efficient Agile software development with market leading HP quality assurance and Web application security software. Read more for all the details.

 

Secure and Compliant Collaboration and Access by  IBM


March 31, 2008 - As part of its comprehensive security framework, IBM offers a broad, unified array of integrated access authorization and identity management solutions that enable organizations to secure their collaboration and access processes in alignment with their overall business needs.

 

Secure and Effective Data Extraction from the SAP® ERP System by  Winshuttle, LLC


December 10, 2008 - This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security.

 

Secure by Design Protection for Application and Desktop Virtualization by  Citrix


May 22, 2014 - This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.

 

Secure By Design: Building Identity-based Security into Today’s Information Systems by  IBM


March 11, 2013 - Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource.

 

Secure Cloud Access Reference Architecture & Use Model by  Intel


March 17, 2011 - This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).

 

Secure Cloud Access Reference Architecture Model by  Intel


May 10, 2011 - Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.

 

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure by  Radiant Logic, Inc.


December 31, 2012 - This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.

 

Secure Enterprise e-mail Solutions with Microsoft® Exchange by  Agilysys-Sun Technology Solutions


July 07, 1967 - This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.

 

Secure Enterprise File Sharing by  Citrix Systems, Inc.


August 23, 2013 - IT organizations today face an urgent need to get control over file sync and sharing in the enterprise. This short video discusses considerations for secure enterprise file sharing, including recommendations on how to securely and easily share files, access them from anywhere and sync them across devices.

 

Secure File Transfer in the Era of Compliance by  Ipswitch WhatsUp Gold


July 30, 2007 - Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information.

 

Secure File Transfer Solution Saves Bank Time and Money by  Linoma Software


March 24, 2010 - Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.

 

Secure File Transfer Tech Guide by  SearchSecurity.com


February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.

 

Secure File Transfer: Send it Fast, but Send it Safely by  SearchSecurity.com


April 14, 2014 - FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.

 

Secure internet routing by  ComputerWeekly.com


April 10, 2014 - This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

 

Secure Internet Single Sign-On (SSO) 101 by  Ping Identity Corporation


June 08, 2009 - Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.

 

Secure iPhone Access to Corporate Web Applications by  F5 Networks


November 13, 2013 - This exclusive resource discusses how your organization can secure one of the top mobile devices on the market, ensuring that its access to corporate web applications is safe.

 

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data by  OpenText


October 30, 2013 - In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.

 

Secure Mobile Access for Enterprise Employees by  CA Technologies.


December 31, 2012 - This white paper explains the top 4 challenges of integrating corporate data with mobile applications for remote users. Click now to unveil a solution that acts as a mobile gateway and ensures data adaptation, performance optimization, security, and improved management for mobile developers.

 

Secure Mobile Access to Corporate Applications by  F5 Networks


November 15, 2013 - This exclusive paper discusses how your organization can keep access to mobile business applications secure, analyzing a solution that provides benefits such as user authentication, SSO capability, and saving credentials.

 

Secure Mobile Collaboration by  Cisco Systems, Inc.


January 22, 2014 - Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile.

 

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption by  Aladdin Knowledge Systems


August 01, 2008 - Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.

 

Secure Mobile Printing for Business by  Hewlett-Packard Limited


October 08, 2013 - This informative white paper discusses how your organisation can enable reliable printing from any mobile platform or operating system while still providing IT administrators the control over network access and output to protect confidential information.

 

Secure Network Access for Personal Mobile Devices by  Cisco


September 30, 2012 - This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.

 

Secure Offsite Data Storage: It Keeps You Running by  Iron Mountain


October 22, 2012 - Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage.

 

Secure Remote Access by  RSA, The Security Division of EMC


September 26, 2007 - This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...

 

Secure Remote Access Tools and Techniques by  TechTarget


March 18, 2014 - Share your top secure remote access plans, priorities, and challenges for next year and you'll gain exclusive access to "Secure Remote Access Tools and Techniques" – a reference guide compiled by our editorial experts that is guaranteed to help you provide faster, more secure remote access support to end-users.

 

Secure Remote Access your Users will Love by  Citrix


January 06, 2014 - This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose.

 

Secure Search: Balancing Security with the Need for Information Access by  EMC Corporation


August 14, 2008 - This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search.

 

Secure Smartphone Apps: The Next Generation by  BlackBerry


April 07, 2010 - The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.

 

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by  Forum Systems


September 13, 2005 - Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more.

 

Secure Tape Vaulting Strategies for Serious Data Protection by  Iron Mountain


February 28, 2012 - Your tapes deserve the best protection possible. Ensure they get it by reading this white paper filled with best practices for keeping data safe and secure. Discover the benefits associated with data housed onsite vs. offsite, learn 3 key questions to ask regarding your existing backup strategy, discover four keys to tape success and more.

 

Secure the Enterprise with Confidence by  IBM


July 31, 2013 - This informative paper examines how organizations are addressing this increase in security threats and how today's mainframe can be used as a secure application platform.

 

SECURE TOKENS:PREVENTING TWO-FACTOR TOKEN AUTHENTICATION EXPLOITS by  SearchSecurity.com


September 18, 2013 - This expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.

 

Secure Unified Access with Cisco Catalyst 2960-X and 2960-XR Series Switches by  Cisco


December 31, 2013 - This informative whitepaper explores the security benefits of an industry leader's networking switch technology.

 

Secure Virtual Desktop Infrastructure for HIPAA Compliance by  Imprivata


April 23, 2014 - This white paper explores the benefits of a virtual desktop infrastructure (VDI) for healthcare facilities trying to implement mobile devices for improved secure patient data access.

 

Secure Web Gateway Deployment Methodologies by  BlueCoat


September 09, 2010 - In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users.

 

Secure Web Gateway Overview: Implementation Best Practices by  SearchSecurity.com


May 10, 2013 - This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!

 

Secure Web Gateway Overview: Implementation Best Practices by  Sophos, Inc.


November 27, 2012 - This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

 

Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations by  SonicWALL


July 06, 2009 - This paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer.

 

Secure Your Backup Tapes Every Step of the Way by  Iron Mountain


July 31, 2012 - This short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service.

 

Secure your data – protect your business by  ComputerWeekly.com


November 12, 2012 - This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.

 

Secure Your Journey to the Cloud with Data Protection by  Trend Micro, Inc.


October 07, 2011 - View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security.

 

Secure Your Mobile Content While Increasing Productivity by  Accellion, Inc.


December 31, 2013 - This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.

 

Secure, Affordable, and Easy to Administer Healthcare Networks by  HP & Intel®


May 09, 2011 - With HP networking solutions as a cornerstone, the HP Converged Infrastructure delivers an architectural blueprint that integrates servers, storage, and networking, eliminating technology silos and freeing up resources to focus more on implementing new and innovative programs.

 

Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management by  BlackBerry


December 13, 2013 - This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keep user information separate and private,

 

Secure, Optimized Global Access to Corporate Resources by  F5 Networks


November 15, 2013 - This exclusive paper examines a unified access solution that provides end-to-end availability and optimization with secure unified access, extending the application policy to the client.

 

Secure, Reliable, Any-Size File Transfer with FileXpress by  Attachmate Corporation


February 20, 2013 - This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.

 

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager by  Novell, Inc.


December 08, 2009 - Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.

 

SecureAnywhere Web Security service by  Webroot


May 17, 2013 - This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users.

 

Securely Accelerate Your Mobile Business by  CA Technologies.


December 11, 2013 - This exclusive paper discusses how you can take an application- and data-centric approach to mobile security so you can balance business enablement with protection, all the while maintaining user privacy.

 

Securely Enable Online Business by  CA Technologies.


September 10, 2012 - Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.

 

Securely Enabling VoIP Remote Users by  Sipera Systems


August 01, 2008 - This white paper details the requirements for securely enabling VoIP remote users and why traditional data security products, such as IPSec VPNs, are not able to properly handle them.

 

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by  GeoTrust, Inc.


May 16, 2013 - This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!

 

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by  GeoTrust, Inc.


December 19, 2012 - This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.

 

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by  SearchSecurity.com


October 17, 2013 - Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

 

Securely Manage Enterprise Data and Apps with SAP® Afaria® for iOS 5 by  SAP AG


July 22, 2013 - This exclusive paper examines a mobile device management solution that provides the freedom that mobile workers have come to expect from their own devices while ensuring that IT has secure control to keep corporate data safe and compliant.

 

Securely Publish and Manage Web APIs with CloudControl by  Layer 7 Technologies


July 20, 2011 - Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.

 

Securex Selects CA Nimsoft to Streamline IT Monitoring by  CA Technologies.


December 31, 2012 - This case study tells the story of one organization who selected Nimsoft Monitor from CA to provide numerous IT monitoring benefits such as reduced complexity, secure application delivery and more.

 

Secure with Confidence: Secure Your Enterprise with zEnterprise by  IBM


July 31, 2013 - Check out this exclusive white paper to find out about IBM zEnterprise System and the results of a study of customers spending patterns who have deployed it.

 

Securing a Dynamic Infrastructure by  IBM


June 12, 2009 - This white paper describes how security that is built into a dynamic infrastructure can mitigate risks, enabling agility, secure collaboration, and business transformation. The IBM Security Framework and lifecycle approach can help address changing business requirements.

 

Securing AD to Meet Regulatory Compliance by  SUSE


March 01, 2006 - With the myriad of regulations and their vague requirements, organizations must secure their Active Directory environment to comply with regulations and satisfy external and internal auditors.

 

Securing and Controlling Sensitive Data in the Cloud by  Trend Micro


December 31, 2012 - This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.

 

Securing and Managing Your Enterprise: An Integrated Approach by  Novell, Inc.


December 04, 2009 - Your organization has a dizzying number of platforms, directories, systems and applications - all requiring your attention and administration. So how can you integrate and automate fragmented management tasks while addressing a full range of GRC issues? You can choose the security and system management solution from Novell®

 

Securing and Mitigating Risk in the Cloud by  SearchSecurity.com


July 18, 2013 - Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition.

 

Securing Business Communications Applications in Converged Networks - Best Practices by  Avaya Inc.


June 01, 2008 - Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.

 

Securing Cloud Computing For Enterprise Collaboration by  IntraLinks, Inc


April 21, 2014 - Consult the following white paper to explore the current state of security in the cloud as well as what you need to look for when selecting an appropriate vendor for your business. Learn about the 4 security areas that need to be covered, tips for getting info from service providers, security check lists, and more.

 

Securing Corporate Data in the Age of Mobile Computing by  SearchSecurity.com


January 20, 2012 - This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.

 

Securing Data Stored on Tape with Encryption by  Quantum Corporation


April 30, 2010 - Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help.

 

Securing Data Stored On Tape With Encryption by  Quantum Corporation


July 01, 2009 - With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.

 

Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution by  Quantum Corporation


October 23, 2008 - Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise.

 

Securing Data, Not Endpoints: The Best Way to Control Consumerization by  SearchSecurity.com


November 27, 2012 - Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

 

Securing Embedded Software with Threat Modeling by  Klocwork


September 02, 2011 - This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.

 

Securing End-User Mobile Devices in the Enterprise by  IBM


August 12, 2011 - As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.

 

Securing Identities and Data Across Mobile Apps by  CA Technologies.


December 31, 2013 - This white paper highlights the 3 major challenges in protecting user identities through mobile applications. Read on to discover a mobile gateway solution that offers secure access and user protection.

 

Securing Medical Devices by  McAfee, Inc.


May 25, 2012 - This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information.

 

Securing microsoft exchange 2010 With Thawte SSL Certificates by  Thawte Inc.


July 12, 2011 - Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010.

 

Securing Microsoft Exchange 2010 with VeriSign Authentication Services by  VeriSign EMEA


October 26, 2011 - This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).

 

Securing mobile devices in the business environment by  IBM


October 31, 2011 - As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.

 

Securing Network Access for Guests and Contractors by  Bradford Networks


December 12, 2011 - This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.

 

Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs by  Apani


November 18, 2008 - This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management.

 

Securing PostgreSQL from External Attack by  EnterpriseDB Corporation


November 09, 2009 - Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets.

 

Securing Privilege Delegation in Public and Private Cloud Computing Infrastructure by  BeyondTrust Corporation


June 10, 2010 - As an emerging trend that provides rapid access to dynamically scalable and virtualized IT resources, cloud computing promises new and exciting opportunities for organizations to create lean, robust and cost-effective IT infrastructures that better align with business goals. Read this paper to find out more.

 

Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by  Hewlett-Packard Company


July 21, 2009 - Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses.

 

Securing SharePoint: SharePoint Security Best Practices by  Thawte Inc.


May 16, 2013 - This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.

 

Securing the Administration of Virtualization by  RSA, The Security Division of EMC


March 10, 2010 - In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization.

 

Securing the Borderless Enterprise by  Websense, Inc.


February 04, 2010 - A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more.

 

Securing the Cloud for the Enterprise by  Symantec Corporation


September 22, 2011 - Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.

 

Securing the enterprise application layer: Expert Guidelines by  IBM


August 24, 2011 - If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.

 

Securing the Everywhere Network by  SonicWALL


November 01, 2008 - Everywhere networking streamlines facilities and energy costs, eliminates commuting time and expenses, builds global business partnerships, broadens markets and staffing pools and shortens customer response times.

 

Securing the Foundation of Information Technology (IT) Systems by  Trusted Computer Solutions


January 12, 2010 - This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.

 

Securing the Mobile Cloud Connected Enterprise by  CA Technologies.


June 12, 2014 - This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.

 

Securing the mobile enterprise with IBM security solutions by  IBM


August 12, 2013 - Thisinformative resource discusses a portfolio of mobile security solutions that take an adaptive approach to security and can drive down costs.

 

Securing the Next-Generation Data Center by  McAfee, Inc.


August 11, 2011 - Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation.

 

Securing the Organization: Creating a Partnership between HR and Information Security by  ISC2


September 09, 2008 - The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.

 

Securing the Physical, Virtual, Cloud Continuum by  Juniper Networks, Inc and Plan B Technologies, Inc


July 26, 2010 - Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure.

 

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by  Websense, Inc.


July 14, 2011 - Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.

 

Securing the Virtual World by  WatchGuard Technologies, Inc.


September 27, 2012 - With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach.

 

Securing Today’s Mobile Workforce by  Juniper Networks, Inc.


February 15, 2012 - BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

 

Securing Virtual Compute Infrastructure in the Cloud by  SAVVIS


February 02, 2011 - Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and reduce costs, enterprises have recently implemented virtualization to obtain on-demand access to additional compute resources.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts