Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF White Papers (View All Report Types)
126 - 150 of 429 Matches Previous Page  |  Next Page
From Audit Compliance to App Stores, Accelerate your Move to Software Asset Management
sponsored by IBM
WHITE PAPER: This exclusive whitepaper will help you prepare for a software audit now and in the future.
Posted: 25 Jul 2014 | Published: 09 May 2013

IBM

Get the Facts on Software-Defined Networking
sponsored by Dell, Inc.
WHITE PAPER: This paper provides an overview of Dell's point of view on software-defined networking and Open Networking, offering guidance on how to prepare an optimal technology strategy with the business, technical and operational benefits of these powerful emerging paradigms.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Dell, Inc.

Getting Started with Service Virtualization
sponsored by Parasoft Corporation
WHITE PAPER: Service Virtualization is a viable way to reduce the complexity and the costs of managing multiple environments while providing ubiquitous access for development and test. Access this white paper to learn how it allows you to reduce infrastructure costs, improve provisioning/maintenance of test environments, increase test coverage, and more.
Posted: 07 Jan 2015 | Published: 30 Nov 2011

Parasoft Corporation

Handling Software Management in the World of the Cloud
sponsored by CDW Corporation
WHITE PAPER: This important whitepaper covers how to handle software management in light of growing technology trends like the cloud.
Posted: 08 Aug 2014 | Published: 08 Apr 2014

CDW Corporation

Hot Vendors: Nexenta - Helping to Define the Software-Defined Enterprise
sponsored by Nexenta
WHITE PAPER: Read this IDC Vendor Profile about the technologies, products, and market strategy of a privately-held U.S.-based company that addresses software-defined storage.
Posted: 25 Nov 2014 | Published: 28 Feb 2014

Nexenta

How BlackBerry Addresses BYOD Security Issues
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

How can SMBs meet the Virtualization Challenge?
sponsored by EMC
WHITE PAPER: Access this infographic to find out how SMBs can ensure that their virtual storage investments support their business goals and budgets.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

EMC

Four Common ERP Implementation Mistakes
sponsored by IFS
WHITE PAPER: Here are four common mistakes an implementation leader and team can make, and suggestions on how to avoid them.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

IFS

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Hewlett-Packard Company

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign

Go for the Green - Realize Both Cash and Environmental Savings across the Enterprise
sponsored by Metastorm
WHITE PAPER: Implementing a common technology platform for business process management and enterprise modeling - such as Metastorm Enterprise™ - will allow you to "go green" in more ways than one.
Posted: 20 May 2008 | Published: 01 May 2008

Metastorm

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

GPS Receiver Testing
sponsored by National Instruments
WHITE PAPER: Today, the power of software enables you to create GPS waveforms that accurately emulate the real word signal. In addition, advances in instrument bus technology enable record and playback of live GPS signals with PXI instrumentation.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Guide: Enterprise Security Reporter
sponsored by ScriptLogic Corporation
WHITE PAPER: In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Guide: Security Explorer for SharePoint
sponsored by ScriptLogic Corporation
WHITE PAPER: With the growing emphasis on regulatory compliance requirements, the need to place strict security measures on the permissions within SharePoint has grown.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet, Inc.
WHITE PAPER: This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

SafeNet, Inc.

High-performance protection at the network edge—what, why and how
sponsored by Sophos, Inc.
WHITE PAPER: With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.
Posted: 05 Jan 2010 | Published: 05 Nov 2009

Sophos, Inc.

Hitachi Dynamic Provisioning Software at United Airlines
sponsored by Hitachi Data Systems
WHITE PAPER: This paper describes virtualization capabilities of the new Hitachi Universal Storage Platform™ V with Hitachi Dynamic Provisioning software which improve storage utilization to new levels...
Posted: 11 Aug 2008 | Published: 01 Mar 2008

Hitachi Data Systems
126 - 150 of 429 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement