Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACFReports
101 - 125 of 694 Matches Previous Page  | Next Page
Composite applications - Break the delivery logjam with HP Service Virtualization
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper takes a look at service virtualization, and how it can speed application development by replicating unavailable components, and improve quality control with multiple scenario testing.
Posted: 07 Nov 2013 | Published: 03 Dec 2012

Hewlett-Packard Company

Concur Travel and Expense solution
sponsored by Concur Technologies
WHITE PAPER: This guide talks about a solution that allows users to capture all of their travel and expense information digitally and present it all in an accurate automated report.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

Concur Technologies

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Conquering the sys-admin challenge
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from Quocirca presents new data on how well organisations are able to automate their sys-admin procedures, manage the use of privilege and satisfy the requirements of auditors.
Posted: 29 Oct 2012 | Published: 29 Oct 2012

ComputerWeekly.com

Considerations For Effective Software License Management
sponsored by CDW Corporation
EGUIDE: This expert e-guide provides tips, tricks, and tactics to help you successfully approach software license management. Inside, find techniques for managing software licenses in virtual data centers, a checklist for effective software licensing, and more.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Crucial Considerations For Cloud Licensing
sponsored by CDW Corporation
EGUIDE: This expert e-guide from SearchCloudComputing.com offers a primer on cloud licensing. Read on to learn about your options for cloud license management, five licensing factors to consider when planning a cloud migration, and more.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER: As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

ComputerWeekly.com

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing.
Posted: 21 May 2012 | Published: 22 May 2012

ComputerWeekly.com

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com

Computer Weekly 24 January 2012: Has Microsoft succeeded with Trustworthy Computing?
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now.
Posted: 23 Jan 2012 | Published: 24 Jan 2012

ComputerWeekly.com

Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now.
Posted: 11 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

Computer Weekly – 19 February 2013: Software Developers in demand
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at why companies are struggling to attract the right talent for in-house IT. We investigate why CIOs are not happy with Oracle's Fusion strategy. And betting company William Hill tells us how mobile technology has changed the high street bookmaker. Read the issue now.
Posted: 18 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now.
Posted: 07 Jan 2013 | Published: 08 Jan 2013

ComputerWeekly.com

Concurrent Computing for SCA Applications: Achieving Scalability in a Service-oriented Application Environment
sponsored by Rogue Wave Software
WHITE PAPER: The SCA specifications define a programming model for assembling software services in a service-oriented architecture that offers great flexibility and agility.
Posted: 21 Jul 2008 | Published: 01 Jan 2007

Rogue Wave Software

Configuration and Change Management for IT Compliance and Risk Management
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.
Posted: 08 Jan 2009 | Published: 01 Nov 2007

Tripwire, Inc.

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT: NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

CounterMeasures™ Enterprise Platform 8.0
sponsored by Alion Science and Technology
PRODUCT OVERVIEW: Enterprise Platform 8.0 is the most powerful and flexible of the products in the CounterMeasures™ line.
Posted: 24 Jan 2006 | Published: 01 Jan 2005


Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Customer Perspectives on the Benefits of a Collaborative Process to Deliver Software Quality
sponsored by IBM
WHITE PAPER: This Hurwitz and Associates whitepaper shares the successes, challenges and future plans of three companies - Sogeti Group, Accident Compensation Corporation (ACC), and Scotiabank.
Posted: 11 Sep 2009 | Published: 11 Sep 2009

IBM

Customer Relationship Management - Integration for a Customer Centric View
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper provides a valuable list of factors for executive management, IT decision makers and sales professionals to consider when planning a successful CRM integration project.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Sage (UK) Limited

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation
101 - 125 of 694 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement