S Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
S Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
 

Securing Your Business with Your Network: Security Made Simple by  Cisco Systems, Inc.


December 01, 2006 - Network security is essential for your business because it allows employees and vendors to access company voice and data services over a secure network connection, wherever they may be located. Read this paper to learn how to secure your business network

 

Securing Your IT Infrastructure with SOC/NOC Collaboration by  Hewlett-Packard Company


September 28, 2012 - Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.

 

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate by  Thawte Inc.


July 03, 2012 - This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.

 

Securing your Online Data Transfer with SSL by  Thawte Inc.


July 05, 2012 - This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.

 

Securing Your Private Keys as Best Practice for Code Signing Certificates by  Thawte Inc.


September 30, 2013 - This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.

 

Securing your Private Keys as Best Practice for Code Signing Certificates by  VeriSign EMEA


July 28, 2011 - This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.

 

Securing Your Valuable SharePoint Data by  Dell Software


April 01, 2008 - Microsoft SharePoint technology is fast becoming a standard for corporate collaboration and document exchange. This paper outlines some of the challenges related to backup and recovery in Windows SharePoint Services 2003, SharePoint Portal Server 2...

 

Securing  Android, iOS and Windows Tablets and Smartphones by  Citrix


February 24, 2014 - This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.

 

Securing  Android, iOS and Windows Tablets and Smartphones by  Citrix


March 03, 2014 - This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.

 

Securities and capital markets by  IBM


July 07, 2011 - IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.

 

Security - Pix 500 Series Firewalls by  Cisco Systems


The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions.

 

Security - Three Necessary Security Measures to Empower Data Center Transformation by  Cisco Systems, Inc.


July 12, 2013 - Access this informative white paper that presents three must-have security measures to empower data center transformation to virtualization and the cloud.

 

Security Across the Enterprise: Protect and Empower Your Branch Offices by  Cisco Systems, Inc.


October 16, 2008 - Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.

 

Security and Data Protection with Intelligent Desktop Virtualization by  Virtual Computer, Inc.


January 01, 2012 - The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs.

 

Security and High Availability in Cloud Computing Environments by  IBM


July 28, 2011 - Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Take a look at this exclusive resource to learn how adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment.

 

Security Appliances: New Strides in Preventing Intrusions by  IBM


February 18, 2009 - According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.

 

Security as a Service: Benefits and Risks of Cloud-Based Security by  Symantec Corporation


March 01, 2013 - Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.

 

Security Assertion Markup Language (SAML) - the Essential Guide by  Ping Identity Corporation


September 14, 2011 - This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!

 

Security Awareness with Protecting Information by  Information Shield, Inc.


Protecting Information is a quarterly security and privacy awareness newsletter that you can easily customize and distribute to your entire organization.

 

Security based on trust not fear by  Qualys


April 17, 2014 - This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers.

 

Security Best Practices for Developing Windows Azure Applications by  Microsoft


November 17, 2010 - Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform. 

 

Security Best Practices for the Mobile Enterprise by  Juniper Networks, Inc.


February 15, 2012 - The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.

 

Security Blanket by TCS: Enterprise Security Management by  Trusted Computer Solutions


February 12, 2010 - Read this paper to learn how Security Blanket includes pre-defined security guidelines, called Profiles, from some of the most respected security industry leaders in the world.

 

Security Bloopers: Five Common Mistakes by  Cisco Systems, Inc.


February 02, 2009 - IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.

 

Security Considerations for Cloud-Ready Data Centers by  Juniper Networks, Inc.


September 02, 2011 - A network-centric approach to providing security in the data center delivers benefits such as scalability, unified security policy definition and enforcement, visibility into application traffic, and reduced operations overhead.

 

Security considerations for small and medium-sized enterprises (SMEs) by  GFI Software


February 20, 2012 - SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.

 

Security Considerations When Undergoing a Network Refresh by  Hewlett-Packard Company


April 15, 2014 - This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

 

Security Essentials for CIOs by  IBM


March 14, 2013 - Read this whitepaper and learn five important steps to consider when embarking on a BYOD program - steps that will make BYOD use a reality by seamlessly securing corporate data and applications on the device while providing a logical separation from personal activities and data.

 

Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models by  AVG Technologies USA, Inc.


November 05, 2010 - Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing.

 

Security for a Faster World by  Hewlett-Packard Company


June 13, 2013 - This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.

 

Security for a Faster World: Issue 3 by  Hewlett-Packard Limited


October 21, 2013 - Experts discuss the most pressing security trends and the methods needed to keep critical assets safe today.

 

Security for Cloud Computing: 10 Steps to Ensure Success by  IBM


December 31, 2012 - This guide provides an essential reference for cloud security, offering information on the current cloud security landscape and assessing potential concerns.

 

Security For Virtualization: Finding the Right Balance by  Kaspersky Lab


February 20, 2012 - While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

 

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs by  NetMotion Wireless


June 01, 2008 - This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.

 

Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection by  WatchGuard Technologies, Inc.


February 24, 2011 - The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.

 

Security Gateway Buyer's Guide by  Intel


February 14, 2011 - If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.

 

Security Goes Virtual by  AT&T Corp


October 28, 2009 - Virtualization offers the opportunity for a more hands off approach to security. It eliminates the need for local hardware, as well as the time required for security administration. It frees users from worrying about arcane technical details, and eliminates the need for constant attention. Read on to learn more about the benefits of virtualization.

 

Security in a Faster Forward World by  Akamai Technologies


September 30, 2013 - This informative white paper explains why legacy security solutions such as DDoS scrubbing services are no longer effective, and to stay secure in today's world organizations should strengthen their front lines with a Web site protection service. Read on to find a security solution fit for your needs that will keep you safe now and into the future.

 

Security in Cloud Computing by  CSC


January 25, 2013 - This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs.

 

Security in Cloud Computing by  Intel


October 04, 2011 - The cloud’s virtual environment raises many security concerns in businesses, putting intense pressure on IT professionals to enhance security systems. Access this white paper to discover how you can use technology to take control of the security risks in your enterprise.

 

Security in Cloud Computing by  Intel


October 31, 2011 - New and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure.

 

Security in Public and Private Cloud Infrastructures by  Joyent


August 12, 2010 - This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques.

 

Security in the Cloud - Solutions Brief by  Intel


February 22, 2012 - This solution brief poses key questions concerning cloud security and explores new tools you can leverage to ensure the privacy of data at rest and in motion, provide verification of compliance, and more.

 

Security in the Cloud Planning Guide by  Intel


May 15, 2012 - You need to take several key security elements into account when planning your cloud initiative. This guide offers practical guidance for incorporating security into your cloud project and offers a checklist to help you choose the right cloud provider for your organization.

 

Security in the Cloud Planning Guide by  Intel


September 01, 2011 - Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.

 

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud by  Intel


April 08, 2011 - Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.

 

Security in the Face of Disaster by  Motorola, Inc.


January 01, 2006 - Read this white paper to learn how a New Orleans-based systems integrator relied on Motorola's Canopy® wireless broadband platform to bring better communications and security to New Orleans.

 

Security in the Skies by  (ISC)2 UK Ltd


February 26, 2014 - This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.

 

Security Information and Event Management: Unique McAfee data management technology by  McAfee, Inc.


March 23, 2012 - This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.

 

Security Information Management Systems and Application Monitoring by  Hewlett-Packard Company


April 24, 2013 - Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!

 

Security Information Management Systems Aspire to Real-Time Security by  Hewlett-Packard Company


April 24, 2013 - Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.

 

Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized by  IBM


December 31, 2012 - This report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more.

 

Security Intelligence for a Faster World by  Hewlett-Packard Company


May 31, 2012 - This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data.

 

Security Intelligence is the Smart Way to Keep the Cloud Safe by  IBM


October 31, 2013 - This guide explores a unique security intelligence platform and how it can secure your cloud.

 

Security intelligence is the smart way to keep the cloud safe by  IBM


October 31, 2013 - This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs.

 

Security Intelligence – Is Security a Battle You Can Win by  IBM


June 30, 2011 - This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.

 

Security Intelligence: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform by  LogRhythm, Inc.


December 31, 2012 - This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more.

 

Security Intelligence: Can "Big Data" Analytics Overcome our Blind Spots? by  LogRhythm, Inc.


December 31, 2012 - Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.

 

Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security by  LogRhythm, Inc.


September 03, 2013 - Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.

 

Security Labs Report by  M86 Security UK


February 20, 2012 - This Security Labs report offers insight into the significant trends and developments in web and email security today. View now to uncover key findings and gain recommendations on how to protect your organisation.

 

Security Management 2.5: Replacing Your SIEM Yet? by  IBM


February 01, 2014 - This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.

 

Security Pay Rates: UK Permanent Salary Index February 2013 by  ComputerWeekly.com


February 19, 2013 - This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles.

 

Security Policies for Next-Generation IT by  Hexis Cyber Solutions Inc


October 31, 2012 - This CIO Decisions e-zine focuses on effective BYOD security policy. Inside, learn why security threats are evolving faster than the management practices that defend against them and, more importantly, how you can stay ahead.

 

Security Practices for VMware by  Vyatta Inc.


July 10, 2012 - To properly protect your virtual environment, you must address security at the hypervisor, VM, and network level. This presentation transcript details the fundamentals of virtualization security and highlights the importance of establishing effective management policies.

 

Security Practices for Vmware by  Vyatta Inc.


June 20, 2012 - This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.

 

Security Predictions for 2012 by  Websense, Inc.


January 18, 2012 - This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon.

 

Security Predictions for 2012 by  Websense, Inc.


November 22, 2011 - With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.

 

Security risks that can affect your industry by  Websense, Inc.


February 08, 2012 - As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.

 

Security Services: Security Information Management (SIM) Solutions by  Dell SecureWorks UK


March 24, 2011 - The intent of this paper is to provide an executive-level summary of the potential costs associated with managing information security in-house and highlights the advantages of using a Managed Security Services Provider (MSSP) to reduce costs and improve the quality of protection.

 

Security strategy essential to keep ahead of rapidly changing threats by  ComputerWeekly.com


January 27, 2011 - This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists.

 

Security strategy roadmap for cloud computing by  IBM


April 24, 2012 - The benefits of the cloud cannot be fully realized without tackling the security and privacy concerns associated with cloud environments. In this resource, uncover a security roadmap that can help you build a sound approach for successfully achieving your cloud security needs.

 

Security the future: Keeping up with the business by  ComputerWeekly.com


March 01, 2013 - Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture.

 

Security Think Tank: Bring your own device by  ComputerWeekly.com


June 21, 2013 - With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.

 

Security Threat Report 2014 Smarter, Shadier, Stealthier Malware by  Sophos, Inc.


December 23, 2013 - Looking back at the 2013 threat landscape, one thing is clear, malware attacks are becoming increasingly camouflaged. This in-depth report explores the ever-changing threat landscape and the growing trends of cybercriminals.

 

Security Threat Report: 2010 by  Sophos UK


May 25, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

 

Security Threat Report: 2010 by  Sophos, Inc.


March 02, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

 

Security Threat Report: July 2008 by  Sophos, Inc.


November 13, 2008 - This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.

 

Security Threat Report: July 2009 Update by  Sophos, Inc.


July 06, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

 

Security Threat Report: July 2009 Update by  Sophos, Inc.


July 01, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

 

Security Threat Report: Mid-year 2010 by  Sophos, Inc.


October 04, 2010 - Halfway through 2010, cybercrime continues to evolve and grow. As social networking becomes ever more deeply embedded in our lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information. Knowledge is power, and understanding the dangers posed is the first step toward keeping safe and secure.

 

Security through Maturity: A Brief on Securing iSCSI Networks by  Dell, Inc.


May 13, 2009 - Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.

 

Security Trends 2014 by  Global Knowledge


February 21, 2014 - In this resource, find out what you need to know about security trends in 2014.

 

Security Trends 2014 by  Global Knowledge


February 21, 2014 - In this resource, find out what you need to know about security trends in 2014.

 

Security Virtual Jam Session: The Secured Enterprise by  IBM


February 21, 2008 - Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.

 

Security Virtualization: Re-architecting the Appliance Mentality by  Crossbeam Systems


November 01, 2008 - In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today.

 

Security visualisation by  ComputerWeekly.com


January 18, 2013 - This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities.

 

Security Vs. Flexibility: Must IT Management Choose? by  Faronics


August 01, 2008 - This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed.

 

Security Whitepaper: Google Apps Messaging and Collaboration Products by  Google


July 06, 2010 - Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more.

 

Security Whitepaper: Google Apps Messaging and Collaboration Products by  Google Apps


January 19, 2011 - Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more.

 

Security Whitepaper: Google Apps Messaging and Collaboration Products by  Google Apps


January 19, 2011 - Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more.

 

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls by  Cisco


May 15, 2013 - This whitepaper details the trouble modern firewalls have with protecting your data from modern threats and offers a next-generation solution for your organization.

 

Security, Connectivity and Compliance in the Amazon Cloud by  Vyatta Inc.


November 21, 2011 - The Vyatta Network OS for Amazon helps enterprises overcome the limitations of VPC and delivers enterprise class and complete control of network security and connectivity within the Amazon VPC environment. View this data sheet to explore some of the common use cases for Vyatta Network OS and its key benefits.

 

Security-In-Depth Using Integrated Risk-Conscious Controls by  Tripwire, Inc.


December 30, 2011 - This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

 

Security-In-Depth Using Integrated Risk-Conscious Controls by  Tripwire, Inc.


November 09, 2011 - Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.

 

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by  Lumension


September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.

 

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet? by  IBM


February 01, 2014 - This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.

 

SecurStor 12000/16000 RAID by  Excel Meridian Data, Inc.


SecurStor 12000/16000 RAID series are high performance cost effective IDE-to- Ultra160 SCSI or 2 Gb Fibre RAID solutions for workgroups, departmental or LAN storage needs. Scalable from 80 GB to 4TB with up-to (16) IDE hard disk drives.

 

SecurStor 2500 RAID by  Excel Meridian Data, Inc.


SecurStor 2500 RAID is designed as a high-performance and high-availability solution, with multiple configuration options providing available No Single Point of Failure redundancy for up-to 64 TB of multi-host cluster-capable storage.

 

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by  ZANTAZ


January 01, 2008 - This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold."

 

See What CDI Success Looks Like by  Nuance


December 31, 2012 - This informative white paper provides a documentation management solution that helps bridge the clinical and coding gap by offering peer-to-peer instruction for your physicians, nurses, coders, and administrators.

 

SEEBURGER Supply Chain Management (SCM) Monitor for SAP Achieving Real-Time Supply Chain Visibility with New SAP Best Practices by  SEEBURGER


May 18, 2012 - Read this white paper to learn how, centralizing and intelligently automating supply chain monitoring within SAP, you can extend real-time B2B supply chain insight and problem-solving beyond the IT department to your business departments.

 

SEEBURGER Technology Proves Profitable for SEGA by  SEEBURGER


October 01, 2008 - SEEBURGER's B2B Gateway handles business integration for SEGA, due to which SEGA has reduced time to load orders less than 4 minutes, reduced administrative personnel training from three months to three weeks.

 

Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary by  IBM


January 31, 2012 - As cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.

 

Seeding the Clouds: Key Infrastructure Elements of Cloud Computing by  IBM


February 24, 2009 - This paper describes a high-level cloud computing infrastructure services framework and the underlying technology enablers, such as virtualization, automation, self-service portal, monitoring and capacity planning. It also discusses examples of, and the value propositions for, certain data centers that have been built in this manner to date.

 

Seeing Beyond the Big "D" Disasters by  Dell, Inc.


March 20, 2013 - Jon Toigo discusses why you should consider the "little" disasters such as power outages more than natural disasters when it comes to DR planning in this brief presentation transcript.

 

Seeing Clearly: The Benefits of an Intuitive Enterprise Solution by  Intuitive ERP


April 01, 2008 - The Intuitive ERP enterprise solution includes feature-rich and integrated ERP, customer relationship management, business intelligence and e-commerce modules all the tools you need to enhance the productivity and profitability.

 

Seeing is Believing: The Value of Video Collaboration by  Polycom, Inc.


April 02, 2007 - Many companies are talking about the advantages of video conferencing. But what results can you expect? How much more productivity will you see? What does the boost to collaboration look like? Which business units benefit most? Get the answers here.

 

Seeing the Big Picture: A Corporate Guide to Better Decisions through IT by  SAP America, Inc.


September 28, 2009 - Executives at small and midsize companies are making critical business decisions every day based on the information available to them. This information can come from a variety of sources: opinions from peers and colleagues; a personal sense of intuition or business judgment; or data derived internally or externally to the organisation.

 

Seizing the Advantage: When and how to innovate your business model by  IBM


June 22, 2009 - Read this executive report for invaluable insights from IBM® on when and how to innovate your business model—and seize the advantage. 

 

SEKE Podcast - Introduction to Solera DeepSee by  Solera Networks


February 04, 2010 - In this podcast presented by James Hilliard, host of the "See Everything, Know Everything" podcast, and Matthew Wood, Solera Networks' Chief Scientist, you'll learn about the DeepSee tool, which provides administrators, users and C-level executives at a corporation a way to see what is happening on a network in real-time.

 

Select the Right Cloud-Based ITSM Solution by  BMC Software, Inc.


March 20, 2013 - This whitepaper features a three step approach for finding the right Software-as-a-Service IT service management approach for your organization.

 

Select the Right Solution for Endpoint Management by  IBM


May 31, 2013 - This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.

 

Select the Right Solution for Endpoint Management by  IBM


May 31, 2013 - This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

 

Select the right solution for endpoint management by  IBM


August 24, 2012 - Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business.

 

Selecting a Commision and Incentive Compensation System by  ACTEK, Inc.


August 01, 2008 - There are a number of companies offering software products to manage commission, sales incentive, and bonus programs. This whitepaper provides a framework for selecting the right one for your organization.

 

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events by  Fluke Networks


August 09, 2010 - In this white paper you will learn when it is important to use a Network Recorder, and key considerations when selecting a network recorder for back-in-time forensics analysis.

 

Selecting a Next-Generation Firewall: Topic 10 Considerations by  Cisco


February 28, 2014 - In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.

 

Selecting a Practical Enterprise Content Management Solution: Critical Considerations by  Xerox DocuShare


May 01, 2008 - Learn how to put together your content management strategy from the ground up, taking into account business needs, organizational structure and strategic objectives.

 

Selecting a SOA testing tool by  IBM


December 04, 2013 - Consult this expert e-guide and learn best practices for selecting a SOA testing tool, as well as some of the new approaches to building services with SOA.

 

Selecting a Virtualization Solution for Your Small or Midsize Business by  VMware, Inc.


April 19, 2011 - It’s often difficult for businesses to evaluate competing virtualization platforms. Despite superficial similarities, different providers' platforms are far from identical. This paper compares the VMware vSphere virtualization platform to two alternatives, focusing on features and issues.

 

Selecting a Visual Analytics Application by  Tableau Software


April 20, 2009 - Visual analytics is the process of analytical reasoning facilitated by interactive visual interfaces. Its becoming the fastest way for people to explore and understand Business Intelligence data of any size. This paper will introduce you to the seven essential elements of true visual analytics applications.

 

Selecting ALM tools for your organization by  CA Technologies.


June 01, 2012 - Read this expert e-guide to discover: a breakdown of the types of ALM tools that are available to help manage software testing processes− including market leaders and niche players that address specific issues; three key considerations to keep in mind when evaluating ALM tools; and more!

 

Selecting an ERP Solution: A Guide by  Infor


November 14, 2008 - This paper provides guidance on how to develop a good, simple strategy to evaluate and choose the right ERP software package for your company.

 

Selecting an Industry-Standard Metric for Data Center Efficiency by  APC by Schneider Electric


January 01, 2007 - This paper explains some of the metrics that have been used to describe the efficiency of data center physical infrastructure and suggests which metric is the most effective.

 

Selecting Storage in a Virtual Data Center by  Dell Compellent


August 08, 2011 - With Fibre Channel, iSCSI and even prepackaged storage-plus-SAN solutions available, figuring out which makes sense for your particular environment can be tricky. Learn provisioning tactics that can help organizations make the most of their storage.

 

Selecting the Correct SaaS-based IT Service Management Solution: Customers Share Experiences and Insights by  Hewlett-Packard Company


December 31, 2012 - This helpful resource examines the key factors you should consider when choosing a Software-as-a-Service (SaaS)-based IT service management (ITSM) technology, and provides examples of real experiences and lessons from businesses who have already implemented SaaS ITSM.

 

Selecting the Right Class Server UPS by  Eaton Corporation


January 17, 2014 - This brief video offers key insight to help you select the server-class uninterruptible power supply (UPS) that meets your short- and long-term business needs.

 

Selecting the right DLP solution: Enterprise, Lite, or Channel? by  Websense, Inc.


October 06, 2011 - DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.

 

Selecting the right EHR for the Life of your Practice and Your Patients by  HP & Intel®


September 16, 2011 - If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.

 

Selecting the Right Hosting Provider Insider Secrets That Every IT and Business Executive Should Know by  Verio


December 20, 2007 - How can you identify the hosting company that's right for you? What are the business risks? What questions should you ask? Get the facts in this interview with Phil Shih, a research analyst at Tier1 Research, who covers consumer...

 

Selecting VoIP for Your Enterprise by  Global Knowledge Network, Inc.


December 01, 2004 - Voice over Internet Protocol is the future of enterprise telecommunications. Find out if VoIP is the right choice for your company right now. Discover the benefits VoIP has to offer and how to overcome potential pitfalls during deployment.

 

Selection Criteria for Remote Support Tools: “Best-of-Breed” Products Speed ROI for Technology Investment by  NTR Global


October 29, 2009 - Remote support technology is a very popular service and support automation tool for high-tech companies. Freeware and shareware options are available, but come with their own risks. Leveraging a best-of-breed product can improve operational efficiency and customer satisfaction. Read on to learn what to look for in a remote support platform.

 

Self-Learning Performance Management Comes of Age by  Netuitive


February 10, 2009 - Leading analysts explain how new behavior learning technology is helping IT operations achieve truly proactive service management while eliminating useless data and administrative chores.

 

Self-Management of Passwords (SMOP) Version 1.1 by  turbo-IT Corporation


May 17, 2011 - Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs.

 

Self-Service Business Intelligence: Empowering Users to Generate Insights by  Dell Software


September 01, 2011 - In this Dell/The Data Warehouse Institute report, get common-sense recommendations and best practices for safe, secure and successful self-service BI. Read it today.

 

Self-Service That Really Serves by  Oracle Corporation


June 10, 2009 - To truly meet the demands of the informed consumer, self-service solutions must have fully integrated e-commerce and e-billing systems that accommodate every aspect of the online customer experience. Read this free white paper to learn about all-in-one systems that build your brand and keep customers coming back.

 

Sell More Anytime, Anywhere, Any Device by  Oracle Corporation


August 22, 2013 - Sales reps need access to what they need to sell. Anytime and anywhere from their smart phone, tablet, or laptop. In this video, learn how Oracle Sales Cloud mobility solutions work the way reps work to help them sell more effectively.

 

Sell. Smarter. Redefining commerce in the age of the customer by  IBM


May 01, 2012 - Discover innovative commerce technologies designed to enable businesses to sell smarter and transform buyers into loyal, returning customers. Uncover the 6 key selling areas these strategies target, including cross-channel selling, payments and settlements, store solutions, distributed order management, and more.

 

Semantic Integration & The Data Life Cycle by  Progress


November 23, 2011 - Read this paper to discover an alternative approach to data integration that ensures that not only is data correct and valid based on your business rules, but more importantly provides the means to fully operationalize those rules in a manner that is both intelligible to business and agile across all segments of the change lifecycle.

 

Send Your Tapes to a Better Climate by  Iron Mountain


March 01, 2012 - Check out this white paper for a checklist of key questions to ask before choosing an offsite tape storage partner. Learn what the ideal requirements for tape storage are, discover what you should be looking for in a potential storage partner and more.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts