Software  >   Systems Software  >   Security Software  >  

RACF

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACFReports
226 - 250 of 809 Matches Previous Page  | Next Page
Enabling a Pragmatic Journey to the Cloud
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a provider that offers cloud solutions that are simple, highly adaptable, and are seamlessly scalable.
Posted: 23 Oct 2014 | Published: 01 Jul 2014

Juniper Networks, Inc.

Endpoint Security IT Decision Center Handbook 1
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

SearchSecurity.com

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com

Enhance Software License Compliance with Enterprise App Stores
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Ensure the Safety & Security of Apps, Documents E-Mails and More
sponsored by IBM
VIDEO: Uncover the ins-and-outs of a leading secure productivity suite that promises to protect your employee's e-mails, documents, apps and the web for work.
Posted: 05 Sep 2014 | Premiered: 05 Sep 2014

IBM

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

ERP Consolidation: And Then There Was One
sponsored by SearchManufacturingERP
EBOOK: Multiple ERP systems and mobile and cloud computing technologies are adding to the ERP integration challenges facing organizations today.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

SearchManufacturingERP

Essential enterprise mobile device security controls
sponsored by SearchSecurity.com
WHITE PAPER: This expert paper discusses the key challenges for improving your mobile security and what tools you can leverage in order to overcome them. Access this resource now and find out which security control solutions are critical to secure your mobile environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Examining a Next-Level Software-Defined Data Center Management Platform
sponsored by Hewlett-Packard Limited and Intel ®
WHITE PAPER: This white paper examines the software-defined data center (SDDC) and its ability to maximize infrastructure and scale services as needed while making them more effective and efficient. Read on to learn more.
Posted: 05 Nov 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited and Intel ®

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Endpoint Security IT Decision Center Handbook 3
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Endpoint Security Technology
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

Webroot

ENTERPRISE APPLICATION ARCHIVING: Unified Protection and Management for Enterprise Application Output
sponsored by EMC Corporation
WHITE PAPER: Today easy management of and access to archives is more than compliance and governance, it is also about improving service, repurposing content, creating new revenue streams, protecting public safety and more.
Posted: 13 Mar 2008 | Published: 12 Mar 2008

EMC Corporation

Enterprise Engineer 3.5
sponsored by McLaren Software
PRODUCT LITERATURE: McLaren's Enterprise Engineer application suite assures the integrity of your asset documentation, providing a single point of control to manage the lifecycle of asset related content.
Posted: 01 Feb 2008 | Published: 01 Jan 2008

McLaren Software

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Epicor ICE 2.0: Introducing Next-Generation Business Architecture
sponsored by Epicor Software Corporation
WHITE PAPER: Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Epicor Software Corporation

ERP Software: Top Questions to Ask Before You Buy
sponsored by Infor
EGUIDE: In this e-guide, Frank Scavo, principal analyst at Consellation Research, and China Martens, analyst at Forrester Research Inc., weed through the clutter to provide key questions companies should ask prior to software selection.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

Infor

Evaluating Wireless Intrusion Prevention
sponsored by AirTight Networks, Inc.
WHITE PAPER: This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.
Posted: 16 Apr 2013 | Published: 15 Apr 2013

AirTight Networks, Inc.

Expert insight: What you should know about mainframe systems
sponsored by CA Technologies.
EGUIDE: Whether you are considering the mainframe or have already made an investment, there are several key points you should keep in mind. This expert e-guide takes a closer look at the mainframe and the common misconceptions surrounding it. Discover how mainframes compare to x86 platforms and get expert answers to your peers' frequently asked questions.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

CA Technologies.

Expert Overview: Dedupe Types, Offerings and Benefits to Cloud Backup
sponsored by Essextec
EGUIDE: This expert guide presents an in-depth overview of each option, covering both the strengths and weaknesses. Find out how hardware and software-based approaches can be used in conjunction and discover the speed and cost benefits dedupe can bring to cloud backup.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Essextec

Expert tips for realizing virtualization benefits through budgeting
sponsored by VMware, Inc.
EGUIDE: This expert e-guide highlights how to reap the benefits of server virtualization by considering four important factors: choice of hypervisor, software licensing, hardware and training.
Posted: 09 May 2011 | Published: 09 May 2011

VMware, Inc.
226 - 250 of 809 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement