IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
SignaturesReports
 
Spanish Engineering Organization Bridges Cost Savings with Business Efficiency Using HID Global’s Smart Card Solutions
sponsored by HID
CASE STUDY: This case study explains how a Spanish engineering organization used a smart card solution to overcome the obstacles of access control.
Posted: 05 Aug 2014 | Published: 25 Mar 2013

HID

Case Study: Hospital I.T. Infrastructure
sponsored by CDW Healthcare
CASE STUDY: Building a brand new, state-of-the-art medical campus from the ground up requires an I.T. infrastructure capable of supporting newer, more advanced healthcare applications and the massive volumes of digital data generated by these systems. Read this white paper to learn how CDW Healthcare helped a Michigan medical campus to accomplish their goals.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CDW Healthcare

Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

SAP Process Performance: Mystery Solved!
sponsored by Compuware
EBOOK: This e-book features four stories about IT teams tasked with resolving disruptions to their organizations' operations and distribution systems, which appear to be SAP-related but end up requiring troubleshooting far beyond SAP.
Posted: 26 Aug 2014 | Published: 07 May 2014

Compuware

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

AWS Cloud Security
sponsored by CloudPassage
WHITE PAPER: Security and risk professionals should access this Forrester research report to learn about a security solution that provides infrastructure plus a wide set of IT services.
Posted: 29 Aug 2014 | Published: 21 Feb 2014

CloudPassage

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement