Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF White Papers (View All Report Types)
1 - 25 of 466 Matches Previous Page  |  Next Page
10 Myths About Cyber Threat Intelligence: Separating Fact from Fiction
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper clears up 10 common misconceptions surrounding threat intelligence, helping you separate fact from fiction to determine whether or not you could benefit from deploying it in your organization.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Cyveillance, Inc.

10 SIEM Platforms and Their Security Event Management Success
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


3 Strategies to successful multi-channel app delivery
sponsored by Mendix
WHITE PAPER: This white paper introduces three app development strategies you need to follow to compete in today's app-dominated landscape.
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Mendix

3 Tips for Integrating Field Service Management Software with ERP
sponsored by IFS
WHITE PAPER: Dive deep into three questions to better prepare your business for a successful service management software and enterprise resource planning (ERP) integration.
Posted: 06 Aug 2014 | Published: 31 Dec 2012

IFS

4 Steps to Securing Your Data: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to find and address your database vulnerabilities and avoid a data breach.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

451 Research Report: How One Security Tool Compares against the Rest
sponsored by Splunk
WHITE PAPER: This white paper analyzes a relatively new player in the security market and discusses its capabilities, strengths and weaknesses.
Posted: 13 Aug 2015 | Published: 31 Jan 2014

Splunk

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: You know that the loss of a single device or power source could jeopardize network connectivity and your business. In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

5 Power Gen ERP Lessons From the Manufacturing Industry
sponsored by IFS
WHITE PAPER: Uncover the 5 power generation ERP lessons from the manufacturing industry.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

IFS

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

5 Ways to Prevent ECM Projects from Becoming Despised Legacy Apps
sponsored by OnBase by Hyland
WHITE PAPER: Discover the top five challenges that arise from organizations making the "easy choice" and how involving IT in the buying process allows organizations to select a solution that leads to success throughout the lifetime of an ECM solution.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

OnBase by Hyland

A Big Data Approach to Enterprise Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how big data can help you obtain a more advanced level of threat intelligence that can detect new forms of malware.
Posted: 17 Aug 2015 | Published: 31 Dec 2012

Splunk

A framework to Surface Cyber Threats via Security
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

5 Ways IT Equipment Rentals Can Save Your Neck
sponsored by Canvas Systems
WHITE PAPER: Find out how renting pre-owned IT equipment can help your business succeed in completing projects.
Posted: 14 Dec 2007 | Published: 01 Dec 2007

Canvas Systems

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

AtTask

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012?
sponsored by IBM
WHITE PAPER: This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.
Posted: 14 May 2008 | Published: 01 May 2008

IBM

A Guide to Accelerating Business Value for Microsoft Environments
sponsored by EMC Corporation
WHITE PAPER: In this guide we'll learn how EMC can accelerate the business value of Microsoft environments of any size and scope.
Posted: 10 Mar 2008 | Published: 01 Oct 2007

EMC Corporation

A Guide to Branching and Merging Patterns
sponsored by AccuRev
WHITE PAPER: In this paper, gain a better understanding of how branching and merging patterns work and how applying them to your projects can have a profound effect on how your development team handles change management and delivers software.
Posted: 06 Jan 2012 | Published: 05 Jan 2012

AccuRev
1 - 25 of 466 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement