IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures Reports
 
Case Study: Hospital I.T. Infrastructure
sponsored by CDW Healthcare
CASE STUDY: Building a brand new, state-of-the-art medical campus from the ground up requires an I.T. infrastructure capable of supporting newer, more advanced healthcare applications and the massive volumes of digital data generated by these systems. Read this white paper to learn how CDW Healthcare helped a Michigan medical campus to accomplish their goals.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CDW Healthcare

Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Nissan Europe Drives Security with Dual-Chip Smart Cards
sponsored by HID
CASE STUDY: This case study focuses on Nissan Europe and how they easily enabled future applications and credentials by using a single dual-chip smart card. Read on to learn more about Nissan's success with ID cards and if this strategy is right for your security needs.
Posted: 24 Jul 2015 | Published: 25 Mar 2013

HID

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Implementing an Intelligent Security Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll learn about Cisco's intelligent security architecture that spans endpoints, networks, security analytics, malware protection, and threat intelligence. Read on and discover how you can benefit from a more intelligent security system.
Posted: 20 Jul 2015 | Published: 27 Feb 2015

Cisco Systems, Inc.

Fundamentals of Application Release and Deployment
sponsored by IBM
WEBCAST: This webcast discusses strategies for automating the construction of applications as well as release and deployment.
Posted: 20 Jul 2015 | Premiered: Jun 19, 2014

IBM

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Putting the Kibosh on Shadow IT: Best Practices for Hybrid Cloud Management
sponsored by XO Communications
WHITE PAPER: This resource discusses the best ways to implement a hybrid cloud in such a way as to prevent departments from going behind the IT department's back to implement cloud services.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

XO Communications

NetScaler and XenMobile Solution for Enterprise Mobility Deployment Guide
sponsored by Citrix
PRODUCT LITERATURE: This deployment guide carefully explains how you should go about your setting up your NetScaler and ZenMobile to optimize enterprise mobility in your organization.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Citrix

Jboss Enterprise Middleware Healthcheck Service
sponsored by Red Hat
WHITE PAPER: Read this white paper to learn how an enterprise middleware health check can help ensure your enterprise application platform is operating at maximum security and efficiency.
Posted: 29 Jul 2015 | Published: 30 Sep 2012

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement