Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF Reports
201 - 225 of 1238 Matches Previous Page  |  Next Page
Changes to the Mobile, App Modernization, and Refactoring Landscape
sponsored by PowWow
RESOURCE: The mobile development, app modernization, and app refactoring landscape is changing. Access this resource to find out how PowWow Mobile is affecting this change and creating support for native apps built on the Universal Windows Platform. Find out how refactoring technology can simplify the transformation of legacy web apps on mobile devices.
Posted: 24 Feb 2017 | Published: 31 Aug 2016

PowWow

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

Cloud Software Spending Survey 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Download this exclusive report from Kew Associates and Computer Weekly to learn how businesses plan to invest in cloud software between 2012 and 2017.
Posted: 14 Jan 2013 | Published: 14 Jan 2013

ComputerWeekly.com

Combat Today's Threats with A New Approach to Security
sponsored by Fortinet, Inc.
WHITE PAPER: An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Fortinet, Inc.

Combating the Top 4 Sources of Vulnerabilities
sponsored by Veracode, Inc.
WHITE PAPER: Vulnerability software is leading to security breaches. Learn how to combat the top four sources of application software vulnerabilities.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Compliance Challenges & Security Effectiveness in the Workplace
sponsored by Citrix
RESEARCH CONTENT: This research report from the Ponemon Institute uncovers global trends in IT security risks, especially compliance with the EU's GDPR.
Posted: 16 Aug 2017 | Published: 31 Mar 2017

Citrix

Choose the Service Desk Delivery Model that Makes Sense
sponsored by Pangea Systems
WHITE PAPER: This white paper discusses three delivery models, including the benefits and considerations you must take when choosing the right model for your business.
Posted: 20 Jun 2014 | Published: 31 Dec 2012

Pangea Systems

CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier
sponsored by SearchCIO.com
EZINE: Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

SearchCIO.com

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Clabby: Business analytics buying criteria: The Three Maxims
sponsored by IBM.
WHITE PAPER: View this white paper to learn more about what contributes to an effective business analytics buying criteria. It examines the importance of implementing an integrated infrastructure and its relationship to business analytics.
Posted: 22 May 2013 | Published: 17 May 2013

IBM.

Clinical Approach to Technical Upgrade
sponsored by Hexaware Technologies
WHITE PAPER: In this paper, discover the reasons why you should be considering an SAP upgrade to improve enterprise resource planning (ERP) and how to get started. Learn about new features of the latest SAP release as well as the technical advances and new technologies available to you.
Posted: 01 Nov 2011 | Published: 27 Oct 2011

Hexaware Technologies

Closed Loop Lifecycle Planning©: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper encourages all businesses, regardless of size and complexities, to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Hewlett Packard Enterprise

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Cloud Computing and SaaS: A Practical Guide for Financial Professionals
sponsored by Host Analytics, Inc
WHITE PAPER: This white paper looks at cloud-computing and software-as-a-service (SaaS) technologies and what you need to know about these emerging trends.
Posted: 12 Apr 2012 | Published: 16 Sep 2010

Host Analytics, Inc

Cloud Computing Top Threats
sponsored by HPE and Intel® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and Intel® Corporate

Cloud-Based ERP System for Whole Sale Distribution Companies
sponsored by NetSuite
WHITE PAPER: This white paper analyzes NetSuite's key strengths, weaknesses, opportunities, and threats, with particular respect to ERP in the wholesale distribution industry.
Posted: 14 Oct 2011 | Published: 11 Oct 2011

NetSuite

Cloud-based strategy enables fast delivery, market expansion
sponsored by InterSystems
WHITE PAPER: Read on to learn how Ontario Systems cloud-based Complaint Tracker application enables the company's market expansion and how benefits of running the app in the cloud is readily apparent to customers.
Posted: 12 Jul 2016 | Published: 30 Sep 2014

InterSystems

Collaboration in Agile development: Requirements analysis is a team effort
sponsored by Micro Focus
EGUIDE: Agile development roles are no longer set in stone. The most successful and efficient teams work together, each adding their own perspective. This featured article uncovers why testers should participate in requirement analysis and how organizations are getting their whole team more involved in Agile projects.
Posted: 02 May 2012 | Published: 02 May 2012

Micro Focus

Collaborative software delivery: improving software quality with better lifecycle management
sponsored by IBM
WHITE PAPER: Read this white paper and learn how an IBM Rational solution can help your company build better software faster, using an integrated application lifecycle management (ALM) solution designed to support collaboration across distributed agile development teams.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER: As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise
201 - 225 of 1238 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement