Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed    Add to Google    Add to My Yahoo!
Resource Access Control FacilityWhite Papers (View All Report Types)
 
Still Using Proxies for URL Filtering? There's a Better Way
sponsored by Palo Alto Networks
WHITE PAPER: This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Palo Alto Networks

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

How to Handle Software Asset Management in the Face of Modern IT Trends
sponsored by CDW Corporation
WHITE PAPER: This important whitepaper covers how to handle software management in light of growing technology trends like the cloud.
Posted: 08 Aug 2014 | Published: 08 Apr 2014

CDW Corporation

Select the Right Solution for Inner-City Transportation Management
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers the single automated software solution many of public transportation systems are turning to and provides checklists for four key areas that will help you pick the right vendor.
Posted: 22 Jul 2014 | Published: 15 Apr 2014

IBM

Application Serving Environment: WebSphere Application Server Liberty Provile vs. Tomcat
sponsored by IBM
WHITE PAPER: Deciding on an application serving environment is challenging – sifting through an ever-growing market to find the right solutions based on enterprise needs is time consuming and taxing. This comparison white paper considers two possible systems for enterprises.
Posted: 27 Aug 2014 | Published: 31 Oct 2012

IBM

4 Steps to Effective Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, learn about a new security event information management solution that enables faster event processing and real-time security information.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Take Control of your Software with Effective SAM
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

Maxta Storage Platform - Enterprise Storage Re-defined
sponsored by Maxta
WHITE PAPER: This white paper explains how organizations can handle the challenges of data storage for virtual data centers by leveraging a ground breaking, highly resilient, distributed Software-Defined VM Storage Platform that enables organizations to fully realize the vision of the virtual data center.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

Maxta

Use Case: Scaling a University's Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: This white paper explores a use case in which a major research university needed to upgrade its intrusion detection system (IDS) to secure 30,000 users and monitor tens of gigabits of internet traffic each second.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

Reduce data center complexity when you 'go virtual'
sponsored by HP and Intel
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HP and Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement