Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF Reports
151 - 175 of 1131 Matches Previous Page  |  Next Page
BPM-Led Strategies for App Modernization and Robotic Process Automation
sponsored by HelpSystems
EGUIDE: In this e-guide, expert consultant Tom Nolle explores how organizations can leverage BPM to modernize legacy apps effectively. Discover how workflows, APIs, and microservices fit into this framework and your modernization implementation. Plus, learn how BPM will support robotic process automation for the evolving world of IoT and mobile.
Posted: 27 Feb 2017 | Published: 22 Feb 2017

HelpSystems

Breakout Vendors: SaaS Business Applications
sponsored by Coupa
ANALYST REPORT: The SaaS business application market is growing. Out of thousands of vendors, Forrester has identified 6 that are likely to take over the SaaS categories of finance, human resources, e-commerce, procurement, supply chain, and ERP. Access this expert report to see how, as well as a peek at what's next for SaaS innovation.
Posted: 10 Jan 2017 | Published: 10 May 2016

Coupa

Bringing Agility & Visibility Together for Cloud Success
sponsored by Splunk
RESOURCE: Learn how AWS and Splunk are working together to optimize end-to-end visibility in AWS cloud environments to make the most of your cloud platform. You'll discover how you can make machine data accessible, usable, and valuable for everyone.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Splunk

Bringing IT and Security Together for Better Security Response
sponsored by ServiceNow
WHITE PAPER: Security response today is too slow and complex. Learn how to give your enterprise more efficient and timely security response, a streamlined path to remediation, and peace of mind that important assets are secure.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

ServiceNow

Build, Manage, and Test Java Apps in the Cloud
sponsored by Oracle Corporation UK Ltd
RESOURCE: This resource explores how Zamil Industrial enhanced its development initiatives with Oracle Java Cloud Service. Discover how to move from on-premise to the cloud painlessly, and create easy-to-deploy app building and testing environments with zero code change, self-service tools, and more.
Posted: 23 Jan 2017 | Published: 31 Dec 2016

Oracle Corporation UK Ltd

Build, Run, and Analyze Native Mobile Apps Easily
sponsored by PowWow
VIDEO: Web, Windows, Java – whatever kind of apps you have, your organization may be looking to implement a streamlined modernization and development strategy for extending these apps to mobile. Watch this brief video to explore how to leverage software containers, APIs, and machine learning in order to build, run, and analyze native mobile apps.
Posted: 21 Feb 2017 | Premiered: 15 Feb 2017


Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: In this white paper find how to set up your enterprise for future Internet of Things success, how to handle common problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Building and Modernizing Mobile Apps for Windows 10
sponsored by PowWow
RESOURCE: Explore how to resolve app bottlenecks in adopting or migrating to Windows 10. Discover a development platform that enables you to rapidly transform legacy Windows apps or workflows into mobile apps, build native mobile apps for Microsoft's Universal Windows Platform, and run apps in the cloud or on-premise, across a variety of devices and OS.
Posted: 20 Feb 2017 | Published: 20 Feb 2017


Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Building for Tomorrow with Open Server Architecture
sponsored by IBM
RESOURCE: Download this resource now to learn how open server architecture is transforming the data center landscape with collaboration across the stack, increasing flexibility through open community ecosystems. Take advantage of this architecture to realize deep integration of existing IT resources, and more.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

IBM

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Building Mission Critical Mobile Apps Faster
sponsored by AppGyver
WHITE PAPER: This white paper explores how to implement low-code rapid mobile app development (RMAD) to create all of the mobile apps you need to empower workers handling mobile devices every day. Discover how a visual app development platform enables LOB users to help mobilize your organization for an increasingly digital and fast paced world.
Posted: 17 Mar 2017 | Published: 17 Mar 2017

AppGyver

Business Management Software ROI Improvement Guide
sponsored by Sage Software
WHITE PAPER: Aligning technology with your business goals is one of the smartest ways to optimize any software investment (especially when it comes to the cloud). Access this ROI improvement guide to learn how to maximize your business management software solutions to drive great agility and SaaS cost savings.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Sage Software

Busting Myths About Encrypted Communications
sponsored by Symantec & Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Symantec & Blue Coat Systems

Buyer's Guide to Antimalware
sponsored by SearchSecurity.com
EGUIDE: Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

SearchSecurity.com

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Build a Cohesive, Effective Security Strategy
sponsored by Splunk
EGUIDE: Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
Posted: 08 Aug 2016 | Published: 31 Jul 2016

Splunk

BuilderMT Increases Customer Satisfaction from 66% to 90% in Less than a Year with Parature
sponsored by Parature, Inc.
CASE STUDY: BuilderMT is the nation's leading provider of production management software for residential homebuilders, and has achieved wide notoriety and national awards for streamlining the workflow management process and improving the efficiency.
Posted: 25 Feb 2008 | Published: 01 Jan 2006

Parature, Inc.

Building a Mobile Strategy: Analyst Report Shows Key Components to Success
sponsored by Kony
ANALYST REPORT: Access this analyst report to discover how the enterprise appetite for mobilization grows – but progress has been slow.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

Building a Successful Security Operations Center
sponsored by ArcSight, an HP Company
WHITE PAPER: Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC).
Posted: 30 Aug 2010 | Published: 01 Dec 2009

ArcSight, an HP Company

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Building and Managing a Performance Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett Packard Enterprise

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

SearchHealthIT.com
151 - 175 of 1131 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement