Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed    Add to Google    Add to My Yahoo!
Resource Access Control Facility White Papers (View All Report Types)
Software-defined Storage: the overall benefits
sponsored by IBM
WHITE PAPER: This brief video cuts through some of the confusion surrounding SDS and tells you what to look for – and what to avoid – when choosing an SDS product.
Posted: 18 Mar 2015 | Published: 18 Mar 2015


How Business Rule Automation Helps Insurers Deal with Digital Disruption
sponsored by Progress
WHITE PAPER: This white paper explains how business rules automation through a Business Rules Management System (BRMS) helps remove the IT bottleneck to agility.
Posted: 08 Jul 2015 | Published: 31 May 2014


Case Study: A SIEM Effective Enough for a Government Contractor
sponsored by Splunk
WHITE PAPER: This white paper describes how a technology integration business found a SEIM solution strong enough to protect the sensitive government information it manages.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Leveraging the Right Cloud Solution for Your Toughest Data Challenges
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this white paper, learn about new developments in the cloud space, and the factors to consider before setting up a cloud implementation model. Furthermore, learn how to strategize effectively so that you can make an informed choice when selecting a path to cloud adoption.
Posted: 05 Oct 2015 | Published: 30 Jun 2015

Dell, Inc. and Intel®

4 Steps to Securing Your Data: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to find and address your database vulnerabilities and avoid a data breach.
Posted: 27 Jan 2015 | Published: 31 Dec 2014


Enabling the Connected Campus: Mobility Best Practices for Higher Education
sponsored by VMware, Inc.
WHITE PAPER: IT teams on college campuses won't want to miss this helpful resource, which explores the following steps to protecting students' financial and personal information from the risks of BYOD in higher education. View now to learn how to choose the right EMM solution, prepare your network infrastructure, manage apps and content, and more.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

VMware, Inc.

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideload malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015


Managing Food Safety and Quality Using Enterprise Software
sponsored by IFS
WHITE PAPER: Access this white paper to learn how to get a solid grip on process manufacturing with the use of software.
Posted: 20 Feb 2015 | Published: 20 Feb 2015


Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: This white paper explains how implementing an automated, cloud-centric security platform can help you keep you cloud infrastructure secure from any threat.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement