Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed    Add to Google    Add to My Yahoo!
Resource Access Control FacilityReports
 
ROI Case Study: Cloud-Application Security Service
sponsored by Veracode, Inc.
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Redefining the Economics of Storage
sponsored by Dell, Inc.
WHITE PAPER: This white paper assesses a storage service solution that frees IT staff from day-to-day tasks, so they can take on more important and urgent business initiatives.
Posted: 10 Oct 2014 | Published: 31 Aug 2014

Dell, Inc.

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

Redefining the Economics of Storage Analyst Report
sponsored by Dell and VMware
WHITE PAPER: This white paper explains how to assess the potential impact of new storage solutions. It also explains how a storage approach that combines the latest storage software with solid state hardware allows users to consolidate, standardize, and automate storage.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Dell and VMware

Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Software Asset Management (SAM) 101
sponsored by CDW Corporation
VIDEO: CDW offers consulting for software asset management to avoid or reconcile licensing issues. Watch this informative video to learn how launching a CDW partner's tool, Snow Software, allows administrators to see which tools are in use and can then meet with a CDW account executive to plan a licensing program.
Posted: 21 Oct 2014 | Premiered: 30 Sep 2014

CDW Corporation

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Build more robust native mobile applications with IBM the MobileFirst Platform
sponsored by IBM
WHITE PAPER: Learn how IBM MobileFirst Platform Foundation can securely enable mobile application development, delivery and management.
Posted: 15 Sep 2014 | Published: 30 Jun 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement