Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF Reports
101 - 125 of 893 Matches Previous Page  |  Next Page
Big Data Gets Real
sponsored by Intel
RESEARCH CONTENT: Uncover the top 5 facts you need to know about the current state of big data.
Posted: 27 May 2014 | Published: 31 Dec 2013

Intel

Big Data Infrastructure Made Easy: How to Simplify and Accelerate Hadoop Deployment
sponsored by BlueData Software, Inc.
WHITE PAPER: Discover how your organization can accelerate the deployment of Hadoop in this informative white paper. Learn how you can take advantage of cloud technology to implement Hadoop quickly and easily.
Posted: 24 Apr 2015 | Published: 28 Feb 2015

BlueData Software, Inc.

Brian Madden predicts how Wyse vWorkspace 8.5 will fare in the VDI market
sponsored by Dell, Inc.
EGUIDE: In this expert e-guide, world-renowned independent desktop virtualization expert Brian Madden offers his insight into the release of Wyse vWorkspace 8.5. Find out what he thinks of its simplicity, price and Dell enterprise support, and how it will compare to the competition.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Dell, Inc.

Bridging the Big Data Divide with Data Integration
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to find out how unified tooling, engineered systems, and real-time business analytics can help your company capitalize on the hidden potential of big data.
Posted: 22 Apr 2015 | Published: 31 Aug 2012

Oracle Corporation

Build a Strong Security Foundation with the Right Endpoint Protection
sponsored by ESET
WHITE PAPER: This white paper describes one endpoint protection solution that has proven to provide a strong foundation.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Building a Business Case for a Semantic Interoperability Platform
sponsored by Compressus
WHITE PAPER: Read this white paper to learn how data sharing through effective interoperability software can bridge multiple IT systems and share information in concise, actionable formats.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Compressus

Buyer's Guide to Antimalware
sponsored by SearchSecurity.com
EGUIDE: Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

SearchSecurity.com

Capitalize on a Big Opportunity: Move Enterprise Services to the Cloud
sponsored by Dimension Data
WHITE PAPER: Access this informative guidebook to learn how you can build a successful enterprise cloud solution.
Posted: 20 May 2015 | Published: 20 May 2015

Dimension Data

Better Software Management and More Secure Computers
sponsored by Dell, Inc. and Intel®
CASE STUDY: This whitepaper details the systems management solution that Princeton University selected to solve their three major IT problems.
Posted: 18 Jun 2014 | Published: 05 Dec 2013

Dell, Inc. and Intel®

Beyond UTM -- The Value of a Purpose-built Network Security Platform
sponsored by Fortinet, Inc.
WHITE PAPER: It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of.
Posted: 27 Dec 2007 | Published: 01 Aug 2007

Fortinet, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

BuilderMT Increases Customer Satisfaction from 66% to 90% in Less than a Year with Parature
sponsored by Parature, Inc.
CASE STUDY: BuilderMT is the nation's leading provider of production management software for residential homebuilders, and has achieved wide notoriety and national awards for streamlining the workflow management process and improving the efficiency.
Posted: 25 Feb 2008 | Published: 01 Jan 2006

Parature, Inc.

Building a Mobile Strategy: Analyst Report Shows Key Components to Success
sponsored by Kony
ANALYST REPORT: Access this analyst report to discover how the enterprise appetite for mobilization grows – but progress has been slow.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony

Building a Successful Security Operations Center
sponsored by ArcSight, an HP Company
WHITE PAPER: Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC).
Posted: 30 Aug 2010 | Published: 01 Dec 2009

ArcSight, an HP Company

Building and Managing a Performance Center of Excellence
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett-Packard Company

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

CA Data Center Automation Manager Product Brief: A Tactical Approach to Simplify Service Delivery in the Data Center
sponsored by CA Technologies.
PRODUCT LITERATURE: Learn how automating critical operational processes frees up your IT staff to focus on innovation and strategic initiatives, reduces downtime, improves delivery lead time, and helps conserve valuable data center space and power resources.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

CA Technologies.

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Can the Suite Compete? - What Every Recruiter Needs to Know
sponsored by Jobvite
WHITE PAPER: In this resource, HR and business leaders will find a comparison of the strengths and weaknesses of purpose-specific software and bundled software suites, providing you with key information to help you more strategically meet your organization's talent recruitment goals.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

Jobvite

Case Study - System One
sponsored by Webroot
CASE STUDY: This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013

Webroot

Case Study : Virgin Media enhances productivity by consolidating testing tools
sponsored by Hewlett-Packard Limited
WHITE PAPER: This case study looks at how Virgin Media developed a set of transparent, efficient, and unified software testing tools to speed development, and increase quality.
Posted: 07 Nov 2013 | Published: 03 Sep 2012

Hewlett-Packard Limited

Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
sponsored by Panda Security
CASE STUDY: Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.
101 - 125 of 893 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement