Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF Reports
1 - 25 of 858 Matches Previous Page  |  Next Page
10 Myths About Cyber Threat Intelligence: Separating Fact from Fiction
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper clears up 10 common misconceptions surrounding threat intelligence, helping you separate fact from fiction to determine whether or not you could benefit from deploying it in your organization.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Cyveillance, Inc.

10 SIEM Platforms and Their Security Event Management Success
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


2014-15 Deduplicating Backup Appliance Buyer's Guide
sponsored by Hewlett-Packard Limited & Intel® (Processor Intel® Xeon®)
RESOURCE: This buyer's guide is designed to provide users with a powerful yet concise method to evaluate each deduplicating backup appliance so organizations can understand the overall strengths and weaknesses of each one
Posted: 22 Jun 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited & Intel® (Processor  Intel® Xeon®)

3 Guidelines to Establishing Your Code Confidence
sponsored by Rogue Wave Software
WEBCAST: Navigating the day-to-day issues of automotive software development can be overwhelming, but with little effort it can be easily managed. This webinar will explore how to deliver secure, compliant, and defect-free software.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

3 Phases of Your Journey to IT as a Service - Where Are You on Your Journey
sponsored by VMware
RESOURCE: Take a look at this infographic for the three phases of your journey to IT-as-a-Service. Learn about its benefits, including reducing data center costs by 30%.
Posted: 01 Jul 2015 | Published: 31 Mar 2013

VMware

3 Strategies to successful multi-channel app delivery
sponsored by Mendix
WHITE PAPER: This white paper introduces three app development strategies you need to follow to compete in today's app-dominated landscape.
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Mendix

3 Tips for Integrating Field Service Management Software with ERP
sponsored by IFS
WHITE PAPER: Dive deep into three questions to better prepare your business for a successful service management software and enterprise resource planning (ERP) integration.
Posted: 06 Aug 2014 | Published: 31 Dec 2012

IFS

4 Anti-Malware Platforms Put Through an Anti-Exploit Test
sponsored by Malwarebytes Corporation
VIDEO: In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.
Posted: 06 May 2015 | Premiered: 14 Oct 2013


4 Steps to Securing Your Data: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to find and address your database vulnerabilities and avoid a data breach.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

451 Research Report: How One Security Tool Compares against the Rest
sponsored by Splunk
WHITE PAPER: This white paper analyzes a relatively new player in the security market and discusses its capabilities, strengths and weaknesses.
Posted: 13 Aug 2015 | Published: 31 Jan 2014

Splunk

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: You know that the loss of a single device or power source could jeopardize network connectivity and your business. In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

5 Power Gen ERP Lessons From the Manufacturing Industry
sponsored by IFS
WHITE PAPER: Uncover the 5 power generation ERP lessons from the manufacturing industry.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

IFS

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

5 Ways to Prevent ECM Projects from Becoming Despised Legacy Apps
sponsored by OnBase by Hyland
WHITE PAPER: Discover the top five challenges that arise from organizations making the "easy choice" and how involving IT in the buying process allows organizations to select a solution that leads to success throughout the lifetime of an ECM solution.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

OnBase by Hyland

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

2013 North American Software Defined Data Center Management Platforms New Product Innovation Award
sponsored by HP and Intel®
RESEARCH CONTENT: Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.
Posted: 06 Feb 2014 | Published: 31 Dec 2013

HP and Intel®

5 Licensing Factors to Consider When Planning a Cloud Migration
sponsored by CDW Corporation
EGUIDE: This expert e-guide from SearchCloudComputing.com offers a primer on cloud licensing. Read on to learn about your options for cloud license management, five licensing factors to consider when planning a cloud migration, and more.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

5 Ways IT Equipment Rentals Can Save Your Neck
sponsored by Canvas Systems
WHITE PAPER: Find out how renting pre-owned IT equipment can help your business succeed in completing projects.
Posted: 14 Dec 2007 | Published: 01 Dec 2007

Canvas Systems

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013

IBM

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

AtTask
1 - 25 of 858 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement