Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACFWhite Papers (View All Report Types)
126 - 150 of 440 Matches Previous Page  | Next Page
Essential enterprise mobile device security controls
sponsored by SearchSecurity.com
WHITE PAPER: This expert paper discusses the key challenges for improving your mobile security and what tools you can leverage in order to overcome them. Access this resource now and find out which security control solutions are critical to secure your mobile environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Fidelity Information Services and IBM Server/Storage Configuration
sponsored by IBM
WHITE PAPER: This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components.
Posted: 15 Aug 2014 | Published: 31 Mar 2012

IBM

Fidelity Information Services and IBM Storwize V7000 with IBM System Storage Easy Tier
sponsored by IBM
WHITE PAPER: This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components.
Posted: 14 Nov 2013 | Published: 31 Mar 2012

IBM

Finding the Security Balance for Virtual Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Five Easy Steps to Smarter Systems Imaging
sponsored by Dell and Microsoft
WHITE PAPER: This whitepaper takes you through 5 steps for developing a smarter approach to systems imaging that layers a unique set of drivers, updates, applications, configurations and user personality on top of the core configuration images.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Dell and Microsoft

Five security considerations in the mobile age - Strengthen security in mobile environments with WebSphere DataPower appliances
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Gaining an Edge in Banking With Business Analytics
sponsored by Information Builders
WHITE PAPER: Sponsored by Information Builders, this Ventana research paper recommends ensuring that users in midsize banks are appropriately empowered by providing them with the right business analytics.
Posted: 03 May 2013 | Published: 03 May 2013

Information Builders

Get the Facts on Software-Defined Networking
sponsored by Dell, Inc.
WHITE PAPER: This paper provides an overview of Dell's point of view on software-defined networking and Open Networking, offering guidance on how to prepare an optimal technology strategy with the business, technical and operational benefits of these powerful emerging paradigms.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Dell, Inc.

ENTERPRISE APPLICATION ARCHIVING: Unified Protection and Management for Enterprise Application Output
sponsored by EMC Corporation
WHITE PAPER: Today easy management of and access to archives is more than compliance and governance, it is also about improving service, repurposing content, creating new revenue streams, protecting public safety and more.
Posted: 13 Mar 2008 | Published: 12 Mar 2008

EMC Corporation

Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Epicor ICE 2.0: Introducing Next-Generation Business Architecture
sponsored by Epicor Software Corporation
WHITE PAPER: Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Epicor Software Corporation

Evaluating Wireless Intrusion Prevention
sponsored by AirTight Networks, Inc.
WHITE PAPER: This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.
Posted: 16 Apr 2013 | Published: 15 Apr 2013

AirTight Networks, Inc.

Fact or Fiction Security Survival Guide
sponsored by Lumension
WHITE PAPER: This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Find Security Vulnerabilities in Your ASP.NET Applications before Hackers Do
sponsored by Compuware Corporation
WHITE PAPER: Download this product brief to learn how Compuware DevPartner SecurityChecker can help developers build security into applications before applications go into production.
Posted: 01 Dec 2006 | Published: 01 Oct 2006

Compuware Corporation

Five Technologies Simplifying Infrastructure Management
sponsored by Liebert Corporation
WHITE PAPER: This paper describes five infrastructure technologies that are making it easier for growing businesses to introduce new IT systems as needed while maintaining high levels of availability.
Posted: 20 Feb 2008 | Published: 01 Jan 2007

Liebert Corporation

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos, Inc.
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos, Inc.

Four Common ERP Implementation Mistakes
sponsored by IFS
WHITE PAPER: Here are four common mistakes an implementation leader and team can make, and suggestions on how to avoid them.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

IFS

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Hewlett-Packard Company

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign
126 - 150 of 440 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement