S Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
S Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14

Securing Today’s Mobile Workforce by  Juniper Networks, Inc.

February 15, 2012 - BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.


Securing Virtual Compute Infrastructure in the Cloud by  SAVVIS

February 02, 2011 - Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and reduce costs, enterprises have recently implemented virtualization to obtain on-demand access to additional compute resources.


Securing virtual desktop infrastructure with Citrix NetScaler by  Citrix

March 11, 2013 - In this informative resource, discover an appliance tool that integrates an extensive set of network and application-layer protection mechanisms with advanced access and action control capabilities to improve the availability, performance and scalability of your virtual desktop infrastructure.


Securing Virtual Environments by  CA Technologies.

October 06, 2010 - Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.


Securing Virtualised Environments and Accelerating Cloud Computing by  CA Technologies

May 01, 2010 - There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.


Securing Virtualization in Real-World Environments IBM Internet Security Systems by  IBM

June 25, 2009 - With shrinking budgets, organizations are trying to do more with less. But doing so may leave gaps in security, reliability and availability. Read this white paper to see how IBM security solutions can help you address challenges with virtualization, while safeguarding your agency.


Securing Virtualized Data Centers by  Trend Micro, Inc.

December 14, 2009 - On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.


Securing Virtualized Environments and Accelerating Cloud Computing by  CA Technologies.

June 18, 2010 - There is no question that virtualization offers compelling tangible benefits for an IT organization. Virtualization is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualization security, the CA Technologies Access Control (AC) solution, and how to accelerate cloud computing.


Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by  Centrify Corporation

March 19, 2009 - This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators.


Securing Web Applications and Databases for PCI Compliance by  Imperva

July 12, 2009 - This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.


Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g by  Oracle Corporation

June 29, 2012 - While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.


Securing Your Business with Your Network: Security Made Simple by  Cisco Systems, Inc.

December 01, 2006 - Network security is essential for your business because it allows employees and vendors to access company voice and data services over a secure network connection, wherever they may be located. Read this paper to learn how to secure your business network


Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate by  Thawte Inc.

July 03, 2012 - This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.


Securing your Midsized Business by  IBM

October 31, 2013 - This guide explores security management strategies and how to combat the growth of sophisticated threats.


Securing your Online Data Transfer with SSL by  Thawte Inc.

July 05, 2012 - This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.


Securing Your Private Keys as Best Practice for Code Signing Certificates by  Thawte Inc.

September 30, 2013 - This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.


Securing your Private Keys as Best Practice for Code Signing Certificates by  VeriSign EMEA

July 28, 2011 - This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.


Securing Your Valuable SharePoint Data by  Dell Software

April 01, 2008 - Microsoft SharePoint technology is fast becoming a standard for corporate collaboration and document exchange. This paper outlines some of the challenges related to backup and recovery in Windows SharePoint Services 2003, SharePoint Portal Server 2...


Securing  Android, iOS and Windows Tablets and Smartphones by  Citrix

February 24, 2014 - This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.


Securities and capital markets by  IBM

July 07, 2011 - IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.


Security - Pix 500 Series Firewalls by  Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions.


Security Across the Enterprise: Protect and Empower Your Branch Offices by  Cisco Systems, Inc.

October 16, 2008 - Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.


Security and Data Protection with Intelligent Desktop Virtualization by  Virtual Computer, Inc.

January 01, 2012 - The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs.


Security and High Availability in Cloud Computing Environments by  IBM

July 28, 2011 - Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Take a look at this exclusive resource to learn how adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment.


Security Appliances: New Strides in Preventing Intrusions by  IBM

February 18, 2009 - According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.


Security as a Service: Benefits and Risks of Cloud-Based Security by  SearchSecurity.com

March 01, 2013 - Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.


Security Assertion Markup Language (SAML) - the Essential Guide by  Ping Identity Corporation

September 14, 2011 - This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more!


Security Awareness with Protecting Information by  Information Shield, Inc.

Protecting Information is a quarterly security and privacy awareness newsletter that you can easily customize and distribute to your entire organization.


Security Best Practices for Developing Windows Azure Applications by  Microsoft

November 17, 2010 - Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform. 


Security Best Practices for the Mobile Enterprise by  Juniper Networks, Inc.

February 15, 2012 - The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.


Security Big Data: Preparing for a Big Data Collection Implementation by  SearchSecurity.com

June 13, 2013 - This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.


Security Blanket by TCS: Enterprise Security Management by  Trusted Computer Solutions

February 12, 2010 - Read this paper to learn how Security Blanket includes pre-defined security guidelines, called Profiles, from some of the most respected security industry leaders in the world.


Security Bloopers: Five Common Mistakes by  Cisco Systems, Inc.

February 02, 2009 - IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.


Security Considerations for Cloud-Ready Data Centers by  Juniper Networks, Inc.

September 02, 2011 - A network-centric approach to providing security in the data center delivers benefits such as scalability, unified security policy definition and enforcement, visibility into application traffic, and reduced operations overhead.


Security considerations for small and medium-sized enterprises (SMEs) by  GFI Software

February 20, 2012 - SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.


Security Considerations When Undergoing a Network Refresh by  Hewlett-Packard Company

June 02, 2014 - This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.


Security Considerations When Undergoing a Network Refresh by  Hewlett-Packard Company

April 15, 2014 - This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.


Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models by  AVG Technologies USA, Inc.

November 05, 2010 - Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing.


Security for a Faster World by  Hewlett-Packard Company

June 13, 2013 - This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.


Security For Virtualization: Finding the Right Balance by  Kaspersky Lab

February 20, 2012 - While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.


Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs by  NetMotion Wireless

June 01, 2008 - This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.


Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection by  WatchGuard Technologies, Inc.

February 24, 2011 - The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.


Security Gateway Buyer's Guide by  Intel

February 14, 2011 - If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.


Security Goes Virtual by  AT&T Corp

October 28, 2009 - Virtualization offers the opportunity for a more hands off approach to security. It eliminates the need for local hardware, as well as the time required for security administration. It frees users from worrying about arcane technical details, and eliminates the need for constant attention. Read on to learn more about the benefits of virtualization.


Security in Cloud Computing by  CSC

January 25, 2013 - This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs.


Security in Cloud Computing by  Intel

October 04, 2011 - The cloud’s virtual environment raises many security concerns in businesses, putting intense pressure on IT professionals to enhance security systems. Access this white paper to discover how you can use technology to take control of the security risks in your enterprise.


Security in Cloud Computing by  Intel

October 31, 2011 - New and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure.


Security in Public and Private Cloud Infrastructures by  Joyent

August 12, 2010 - This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques.


Security in the Cloud - Solutions Brief by  Intel

February 22, 2012 - This solution brief poses key questions concerning cloud security and explores new tools you can leverage to ensure the privacy of data at rest and in motion, provide verification of compliance, and more.


Security in the Cloud Planning Guide by  Intel

May 15, 2012 - You need to take several key security elements into account when planning your cloud initiative. This guide offers practical guidance for incorporating security into your cloud project and offers a checklist to help you choose the right cloud provider for your organization.


Security in the Cloud Planning Guide by  Intel

September 01, 2011 - Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.


Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud by  Intel

April 08, 2011 - Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.


Security in the Face of Disaster by  Motorola, Inc.

January 01, 2006 - Read this white paper to learn how a New Orleans-based systems integrator relied on Motorola's Canopy® wireless broadband platform to bring better communications and security to New Orleans.


Security in the Skies by  (ISC)2 UK Ltd

February 26, 2014 - This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.


Security Information and Event Management: Unique McAfee data management technology by  McAfee, Inc.

March 23, 2012 - This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.


Security Information Management Systems and Application Monitoring by  SearchSecurity.com

April 24, 2013 - Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!


Security Information Management Systems Aspire to Real-Time Security by  Hewlett-Packard Company

April 24, 2013 - Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.


Security intelligence is the smart way to keep the cloud safe by  IBM

October 31, 2013 - This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs.


Security Intelligence is the Smart Way to Keep the Cloud Safe by  IBM

October 31, 2013 - This guide explores a unique security intelligence platform and how it can secure your cloud.


Security Intelligence – Is Security a Battle You Can Win by  IBM

June 30, 2011 - This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.


Security Labs Report by  M86 Security UK

February 20, 2012 - This Security Labs report offers insight into the significant trends and developments in web and email security today. View now to uncover key findings and gain recommendations on how to protect your organisation.


Security Leadership Series: Security Strategies for Success by  Citrix

May 01, 2014 - This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends.


Security Management 2.5: Replacing Your SIEM Yet? by  IBM

February 01, 2014 - This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.


Security Pay Rates: UK Permanent Salary Index February 2013 by  ComputerWeekly.com

February 19, 2013 - This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles.


Security Policies for Next-Generation IT by  Hexis Cyber Solutions Inc

October 31, 2012 - This CIO Decisions e-zine focuses on effective BYOD security policy. Inside, learn why security threats are evolving faster than the management practices that defend against them and, more importantly, how you can stay ahead.


Security Practices for VMware by  Vyatta Inc.

July 10, 2012 - To properly protect your virtual environment, you must address security at the hypervisor, VM, and network level. This presentation transcript details the fundamentals of virtualization security and highlights the importance of establishing effective management policies.


Security Practices for Vmware by  Vyatta Inc.

June 20, 2012 - This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.


Security Predictions for 2012 by  Websense, Inc.

November 22, 2011 - With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.


Security Predictions for 2012 by  Websense, Inc.

January 18, 2012 - This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon.


Security Primer: Top Tips for Protecting Your System i by  Bytware, Inc.

March 06, 2008 - This E-Guide from TechTarget's Search400.com explores the many components of System i security.


Security Risks in the Cloud by  SearchSecurity.com

January 25, 2013 - This expert guide offers advice for securing data in the public cloud. Hear how your peers are handling cloud security and data privacy issues and gain answers into the top cloud security questions.


Security risks that can affect your industry by  SearchSecurity.com

February 08, 2012 - As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.


Security Services: Security Information Management (SIM) Solutions by  Dell SecureWorks UK

March 24, 2011 - The intent of this paper is to provide an executive-level summary of the potential costs associated with managing information security in-house and highlights the advantages of using a Managed Security Services Provider (MSSP) to reduce costs and improve the quality of protection.


Security strategy essential to keep ahead of rapidly changing threats by  ComputerWeekly.com

January 27, 2011 - This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists.


Security strategy roadmap for cloud computing by  IBM

April 24, 2012 - The benefits of the cloud cannot be fully realized without tackling the security and privacy concerns associated with cloud environments. In this resource, uncover a security roadmap that can help you build a sound approach for successfully achieving your cloud security needs.


Security Testing For Financial Institutions by  Ixia

January 31, 2014 - Security breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis.


Security the future: Keeping up with the business by  ComputerWeekly.com

March 01, 2013 - Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture.


Security Think Tank: Bring your own device by  ComputerWeekly.com

June 21, 2013 - With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.


Security Threat Report 2014 Smarter, Shadier, Stealthier Malware by  Sophos, Inc.

December 23, 2013 - Looking back at the 2013 threat landscape, one thing is clear, malware attacks are becoming increasingly camouflaged. This in-depth report explores the ever-changing threat landscape and the growing trends of cybercriminals.


Security Threat Report: 2010 by  Sophos UK

May 25, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.


Security Threat Report: 2010 by  Sophos, Inc.

March 02, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.


Security Threat Report: July 2008 by  Sophos, Inc.

November 13, 2008 - This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.


Security Threat Report: July 2009 Update by  Sophos, Inc.

July 01, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.


Security Threat Report: July 2009 Update by  Sophos, Inc.

July 06, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.


Security Threat Report: Mid-year 2010 by  Sophos, Inc.

October 04, 2010 - Halfway through 2010, cybercrime continues to evolve and grow. As social networking becomes ever more deeply embedded in our lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information. Knowledge is power, and understanding the dangers posed is the first step toward keeping safe and secure.


Security through Maturity: A Brief on Securing iSCSI Networks by  Dell, Inc.

May 13, 2009 - Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.


Security Trends 2014 by  Global Knowledge

February 21, 2014 - In this resource, find out what you need to know about security trends in 2014.


Security Trends 2014 by  Global Knowledge

February 21, 2014 - In this resource, find out what you need to know about security trends in 2014.


Security Virtual Jam Session: The Secured Enterprise by  IBM

February 21, 2008 - Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.


Security Virtualization: Re-architecting the Appliance Mentality by  Crossbeam Systems

November 01, 2008 - In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today.


Security visualisation by  ComputerWeekly.com

January 18, 2013 - This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities.


Security Vs. Flexibility: Must IT Management Choose? by  Faronics

August 01, 2008 - This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed.


Security Whitepaper: Google Apps Messaging and Collaboration Products by  Google

July 06, 2010 - Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more.


Security Whitepaper: Google Apps Messaging and Collaboration Products by  Google Apps

January 19, 2011 - Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more.


Security Whitepaper: Google Apps Messaging and Collaboration Products by  Google Apps

January 19, 2011 - Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more.


Security, Connectivity and Compliance in the Amazon Cloud by  Vyatta Inc.

November 21, 2011 - The Vyatta Network OS for Amazon helps enterprises overcome the limitations of VPC and delivers enterprise class and complete control of network security and connectivity within the Amazon VPC environment. View this data sheet to explore some of the common use cases for Vyatta Network OS and its key benefits.


Security-In-Depth Using Integrated Risk-Conscious Controls by  Tripwire, Inc.

November 09, 2011 - Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.


Security-In-Depth Using Integrated Risk-Conscious Controls by  Tripwire, Inc.

December 30, 2011 - This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.


SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by  Lumension

September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.


Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet? by  IBM

February 01, 2014 - This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.


SecurStor 12000/16000 RAID by  Excel Meridian Data, Inc.

SecurStor 12000/16000 RAID series are high performance cost effective IDE-to- Ultra160 SCSI or 2 Gb Fibre RAID solutions for workgroups, departmental or LAN storage needs. Scalable from 80 GB to 4TB with up-to (16) IDE hard disk drives.


SecurStor 2500 RAID by  Excel Meridian Data, Inc.

SecurStor 2500 RAID is designed as a high-performance and high-availability solution, with multiple configuration options providing available No Single Point of Failure redundancy for up-to 64 TB of multi-host cluster-capable storage.


Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by  ZANTAZ

January 01, 2008 - This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold."


See What CDI Success Looks Like by  Nuance

December 31, 2012 - This informative white paper provides a documentation management solution that helps bridge the clinical and coding gap by offering peer-to-peer instruction for your physicians, nurses, coders, and administrators.


SEEBURGER Supply Chain Management (SCM) Monitor for SAP Achieving Real-Time Supply Chain Visibility with New SAP Best Practices by  SEEBURGER

May 18, 2012 - Read this white paper to learn how, centralizing and intelligently automating supply chain monitoring within SAP, you can extend real-time B2B supply chain insight and problem-solving beyond the IT department to your business departments.


SEEBURGER Technology Proves Profitable for SEGA by  SEEBURGER

October 01, 2008 - SEEBURGER's B2B Gateway handles business integration for SEGA, due to which SEGA has reduced time to load orders less than 4 minutes, reduced administrative personnel training from three months to three weeks.


Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary by  IBM

January 31, 2012 - As cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.


Seeding the Clouds: Key Infrastructure Elements of Cloud Computing by  IBM

February 24, 2009 - This paper describes a high-level cloud computing infrastructure services framework and the underlying technology enablers, such as virtualization, automation, self-service portal, monitoring and capacity planning. It also discusses examples of, and the value propositions for, certain data centers that have been built in this manner to date.


Seeing Beyond the Big "D" Disasters by  Dell, Inc.

March 20, 2013 - Jon Toigo discusses why you should consider the "little" disasters such as power outages more than natural disasters when it comes to DR planning in this brief presentation transcript.


Seeing Clearly: The Benefits of an Intuitive Enterprise Solution by  Intuitive ERP

April 01, 2008 - The Intuitive ERP enterprise solution includes feature-rich and integrated ERP, customer relationship management, business intelligence and e-commerce modules all the tools you need to enhance the productivity and profitability.


Seeing is Believing: The Value of Video Collaboration by  Polycom, Inc.

April 02, 2007 - Many companies are talking about the advantages of video conferencing. But what results can you expect? How much more productivity will you see? What does the boost to collaboration look like? Which business units benefit most? Get the answers here.


Seeing the Big Picture: A Corporate Guide to Better Decisions through IT by  SAP America, Inc.

September 28, 2009 - Executives at small and midsize companies are making critical business decisions every day based on the information available to them. This information can come from a variety of sources: opinions from peers and colleagues; a personal sense of intuition or business judgment; or data derived internally or externally to the organisation.


Seeing the Voice of the Customer: Identifying Root Cause with Text Analysis Visualization by  SAS

May 02, 2014 - The following white paper explores how text analysis visualization allows for businesses to effectively collect and exploit true value from customer interactions. But not only that, learn how this technology will give way to better overall decision making, real-time analysis and more.


SEGA Europe Ltd. Wins Control of VM Backup and Management with Veeam by  Veeam Software

December 31, 2013 - Check out this case study to learn how video game giant Sega overcame their storage challenges by implementing Veeam storage


Seizing the Advantage: When and how to innovate your business model by  IBM

June 22, 2009 - Read this executive report for invaluable insights from IBM® on when and how to innovate your business model—and seize the advantage. 


SEKE Podcast - Introduction to Solera DeepSee by  Solera Networks

February 04, 2010 - In this podcast presented by James Hilliard, host of the "See Everything, Know Everything" podcast, and Matthew Wood, Solera Networks' Chief Scientist, you'll learn about the DeepSee tool, which provides administrators, users and C-level executives at a corporation a way to see what is happening on a network in real-time.


Select a safe and smart surveillance drive built for your needs by  Seagate Technology

February 28, 2014 - Check out this informative, concise paper for a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use.


Select the Right Cloud Integration Tool For Your Business by  SearchBusinessAnalytics

July 01, 2012 - As the adoption rate of cloud computing services and applications continues to rise, organizations are realizing that cloud migration is not a do-it-yourself type project. Access this expert e-guide to find out how leveraging a cloud integration platform can significantly simplify your transition to the cloud.


Select the Right Solution for Endpoint Management by  IBM

May 31, 2013 - This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.


Select the right solution for endpoint management by  IBM

August 24, 2012 - Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business.


Select the Right Solution for Endpoint Management by  IBM

May 31, 2013 - This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.


Select the right VMware, Hyper-V protection for a modern data center by  Veeam Software

April 17, 2014 - This webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.


Selecting a Commision and Incentive Compensation System by  ACTEK, Inc.

August 01, 2008 - There are a number of companies offering software products to manage commission, sales incentive, and bonus programs. This whitepaper provides a framework for selecting the right one for your organization.


Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events by  Fluke Networks

August 09, 2010 - In this white paper you will learn when it is important to use a Network Recorder, and key considerations when selecting a network recorder for back-in-time forensics analysis.


Selecting a Next-Generation Firewall: Topic 10 Considerations by  Cisco

February 28, 2014 - In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.


Selecting a Practical Enterprise Content Management Solution: Critical Considerations by  Xerox DocuShare

May 01, 2008 - Learn how to put together your content management strategy from the ground up, taking into account business needs, organizational structure and strategic objectives.


Selecting a SOA testing tool by  IBM

December 04, 2013 - Consult this expert e-guide and learn best practices for selecting a SOA testing tool, as well as some of the new approaches to building services with SOA.


Selecting a Virtualization Solution for Your Small or Midsize Business by  VMware, Inc.

April 19, 2011 - It’s often difficult for businesses to evaluate competing virtualization platforms. Despite superficial similarities, different providers' platforms are far from identical. This paper compares the VMware vSphere virtualization platform to two alternatives, focusing on features and issues.


Selecting a Visual Analytics Application by  Tableau Software

April 20, 2009 - Visual analytics is the process of analytical reasoning facilitated by interactive visual interfaces. Its becoming the fastest way for people to explore and understand Business Intelligence data of any size. This paper will introduce you to the seven essential elements of true visual analytics applications.


Selecting ALM tools for your organization by  CA Technologies.

June 01, 2012 - Read this expert e-guide to discover: a breakdown of the types of ALM tools that are available to help manage software testing processes− including market leaders and niche players that address specific issues; three key considerations to keep in mind when evaluating ALM tools; and more!


Selecting an ERP Solution: A Guide by  Infor

November 14, 2008 - This paper provides guidance on how to develop a good, simple strategy to evaluate and choose the right ERP software package for your company.


Selecting an Industry-Standard Metric for Data Center Efficiency by  APC by Schneider Electric

January 01, 2007 - This paper explains some of the metrics that have been used to describe the efficiency of data center physical infrastructure and suggests which metric is the most effective.


Selecting Storage in a Virtual Data Center by  Dell Compellent

August 08, 2011 - With Fibre Channel, iSCSI and even prepackaged storage-plus-SAN solutions available, figuring out which makes sense for your particular environment can be tricky. Learn provisioning tactics that can help organizations make the most of their storage.


Selecting the Right Class Server UPS by  Eaton Corporation

January 17, 2014 - This brief video offers key insight to help you select the server-class uninterruptible power supply (UPS) that meets your short- and long-term business needs.


Selecting the right DLP solution: Enterprise, Lite, or Channel? by  Websense, Inc.

October 06, 2011 - DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.


Selecting the right EHR for the Life of your Practice and Your Patients by  HP & Intel®

September 16, 2011 - If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.


Selecting the Right Hosting Provider Insider Secrets That Every IT and Business Executive Should Know by  Verio

December 20, 2007 - How can you identify the hosting company that's right for you? What are the business risks? What questions should you ask? Get the facts in this interview with Phil Shih, a research analyst at Tier1 Research, who covers consumer...


Selecting VoIP for Your Enterprise by  Global Knowledge Network, Inc.

December 01, 2004 - Voice over Internet Protocol is the future of enterprise telecommunications. Find out if VoIP is the right choice for your company right now. Discover the benefits VoIP has to offer and how to overcome potential pitfalls during deployment.


Selection Criteria for Remote Support Tools: “Best-of-Breed” Products Speed ROI for Technology Investment by  NTR Global

October 29, 2009 - Remote support technology is a very popular service and support automation tool for high-tech companies. Freeware and shareware options are available, but come with their own risks. Leveraging a best-of-breed product can improve operational efficiency and customer satisfaction. Read on to learn what to look for in a remote support platform.


Self-Learning Performance Management Comes of Age by  Netuitive

February 10, 2009 - Leading analysts explain how new behavior learning technology is helping IT operations achieve truly proactive service management while eliminating useless data and administrative chores.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts