Software  >   Systems Software  >   Security Software  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF Reports
201 - 225 of 828 Matches Previous Page  |  Next Page
Detecting Web App Vulnerabilities Before Hackers Do
sponsored by IBM
SOFTWARE DOWNLOAD: View now to learn how a web application analysis tool detects your web app vulnerabilities and compiles them in an easy to read security report to help you remediate faster. View now to learn more.
Posted: 24 Feb 2015 | Premiered: 18 Feb 2015


DevOps For Dummies - New Edition with SAFe
sponsored by IBM
WHITE PAPER: In this "DevOps for Dummies" guide, get an introduction to DevOps from a holistic business perspective. Also learn about key DevOps topics, including principles and best practices, four paths to DevOps adoption, and more.
Posted: 17 Nov 2015 | Published: 31 Dec 2014


Discover How Beth Israel Deaconess Medical Center Protects Vital Data
sponsored by Commvault
CASE STUDY: This white paper examines how the Beth Israel Deaconess Medical Center was able to implement a system that enabled improved management and more effective data recovery data with less risk, keeping them on top of compliance requirements
Posted: 10 Sep 2014 | Published: 31 Dec 2013


Don't sweat assets, liberate them!
sponsored by
ANALYST REPORT: Analysts Clive Longbottom and Rob Bamforth look at the benefits of IT lifecycle management (ITLM)
Posted: 05 Oct 2012 | Published: 05 Oct 2012

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Eliminate application downtime. Learn about the key features of SQL Safe Backup – and gain full access to a 14 day free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014


E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

E-Guide: Improving software with the building security in maturity model
sponsored by
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013


Disaster Preparedness: Is there a hole in your disaster recovery plan?
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.
Posted: 04 Jan 2012 | Published: 04 Jan 2012

Iron Mountain

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Docmosis V2.0
sponsored by Docmosis
TRIAL SOFTWARE: Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.
Posted: 17 Jun 2009 | Premiered: 15 Jun 2009


Document Management with Office SharePoint Server 2007
sponsored by Microsoft
WHITE PAPER: The Office SharePoint Server 2007 document management solution is uniquely positioned to help your organization succeed with its document management goals. With Sharepoint you can extend document management capabilities to all employees, improving compliance with enterprise standards and delivering value to the business.
Posted: 17 Apr 2009 | Published: 01 Aug 2007


Documentum Digital Asset Manager
sponsored by EMC Corporation
SOFTWARE LISTING: EMC Documentum Digital Asset Manager exposes a set of powerful transformations and enhanced content previews, enabling you to fully leverage the value of your digital assets.
Posted: 13 Mar 2008 | Published: 01 Mar 2008

EMC Corporation

Download Unitrends Enterprise Backup, Free for 30 days
sponsored by Unitrends
SOFTWARE DOWNLOAD: This download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.
Posted: 11 Jun 2014 | Premiered: 11 Jun 2014


Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER: This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008


Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Kaspersky Lab

Driving Product Quality With Continuous Verification and Validation
sponsored by IBM
WHITE PAPER: Access this informative white paper to learn more about how continuous verification and validation strategies can help quality teams keep up with agile development. Read on to learn about eth methods and approaches that can enable continuous verification and validation and determine the right strategy for your organization.
Posted: 19 Mar 2015 | Published: 14 Oct 2014


Dynamic Business - From Aspiration to Reality
sponsored by Microsoft India
WHITE PAPER: This resource examines how you can make your organization a dynamic business with the right set of innovative and proactive applications and tools.
Posted: 19 Dec 2013 | Published: 19 Mar 2013

Microsoft India

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012


Dynamic Initiators That Give You the Control You Need
sponsored by MVS Solutions
WHITE PAPER: This paper discusses the initiator requirements, and how ThruPut Manager optimizes and automates batch job queuing and initiation.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

MVS Solutions

E-Guide: Agile Development Process
sponsored by IBM
EGUIDE: This e-guide examines organizational and team challenges of implementing the agile process. This e-guide also will detail how to scale agile software development to large organizations by scaling agile practices and agile work; how to transition small and large development teams to Scrum; and more.
Posted: 30 Mar 2011 | Published: 29 Mar 2011


E-Guide: Application Lifecycle Management (ALM)
sponsored by IBM
EGUIDE: This e-guide discusses the benefits and drawbacks of consistency in ALM and the challenges associated with building and managing quality into the SDLC. This e-guide also provides a thorough overview of roles and responsibilities in an ALM-focused organization and more. Read on to gain a deeper insight into ALM.
Posted: 09 Dec 2010 | Published: 09 Dec 2010


E-Guide: Best practices for selecting high quality hardware for mission-critical applications
sponsored by Cisco Systems, Inc.
EGUIDE: This expert e-guide from explores the specific requirements that must be met to maintain high usability and uptime within mission-critical environment such as SAP. Readers will gain access to tips and best practices for selecting server hardware that supports even the most demanding and critical business applications.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

Cisco Systems, Inc.

E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE: If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

201 - 225 of 828 Matches Previous Page    7 8 9 10 11 12    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement