Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF White Papers (View All Report Types)
126 - 150 of 437 Matches Previous Page  |  Next Page
Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

F & B Chain Uses Acumatica To Manage Accounting and Centralize Business Processes
sponsored by Acumatica
WHITE PAPER: By switching to a SaaS model running on Windows Azure, KFC Singapore saved about $50,000 in IT resources. Access this case study to find out which SaaS product allowed KFC Singapore to utilize the best in data center architecture, database administration, security, and helpdesk support.
Posted: 09 Feb 2015 | Published: 15 Jan 2015

Acumatica

Fairsail - Transforming the workforce experience
sponsored by Fairsail
WHITE PAPER: Cloud computing has transformed all aspects of business, including HR. As organizations become more global, they must take a new approach to HR management. Access this white paper to learn about a global cloud Human Resources Management Software (HRMS) and its benefits.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Fairsail

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Finding The Perfect Path To The Cloud
sponsored by Crayon Group
WHITE PAPER: Access this white paper to explore how Microsoft has made an early move to make things easier for enterprises that wish to embrace a hybrid environment, and help you consider the steps you need to take.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Crayon Group

From Audit Compliance to App Stores, Accelerate your Move to Software Asset Management
sponsored by IBM
WHITE PAPER: This exclusive whitepaper will help you prepare for a software audit now and in the future.
Posted: 25 Jul 2014 | Published: 09 May 2013

IBM

FX Architecture Portfolio Overview
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn about a converged architecture designed to give enterprises the flexibility to adjust the IT infrastructure to specific workloads. Ensure your infrastructure will scale and adapt as business needs change.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc.

Getting Started with Service Virtualization
sponsored by Parasoft Corporation
WHITE PAPER: Service Virtualization is a viable way to reduce the complexity and the costs of managing multiple environments while providing ubiquitous access for development and test. Access this white paper to learn how it allows you to reduce infrastructure costs, improve provisioning/maintenance of test environments, increase test coverage, and more.
Posted: 07 Jan 2015 | Published: 30 Nov 2011

Parasoft Corporation

Fact or Fiction Security Survival Guide
sponsored by Lumension
WHITE PAPER: This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Fidelity Information Services and IBM Storwize V7000 with IBM System Storage Easy Tier
sponsored by IBM
WHITE PAPER: This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components.
Posted: 14 Nov 2013 | Published: 31 Mar 2012

IBM

Find Security Vulnerabilities in Your ASP.NET Applications before Hackers Do
sponsored by Compuware Corporation
WHITE PAPER: Download this product brief to learn how Compuware DevPartner SecurityChecker can help developers build security into applications before applications go into production.
Posted: 01 Dec 2006 | Published: 01 Oct 2006

Compuware Corporation

Five Security Considerations for the Mobile Age
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Five Technologies Simplifying Infrastructure Management
sponsored by Liebert Corporation
WHITE PAPER: This paper describes five infrastructure technologies that are making it easier for growing businesses to introduce new IT systems as needed while maintaining high levels of availability.
Posted: 20 Feb 2008 | Published: 01 Jan 2007

Liebert Corporation

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos, Inc.
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos, Inc.

Four Common ERP Implementation Mistakes
sponsored by IFS
WHITE PAPER: Here are four common mistakes an implementation leader and team can make, and suggestions on how to avoid them.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

IFS

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Hewlett-Packard Company

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign

Go for the Green - Realize Both Cash and Environmental Savings across the Enterprise
sponsored by Metastorm
WHITE PAPER: Implementing a common technology platform for business process management and enterprise modeling - such as Metastorm Enterprise™ - will allow you to "go green" in more ways than one.
Posted: 20 May 2008 | Published: 01 May 2008

Metastorm

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.
126 - 150 of 437 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement