Standards  >   Data Transmission Standards  >  

V.25 Standards

RSS Feed    Add to Google    Add to My Yahoo!
V.25 StandardsReports
 
KPN Focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

Rabobank International Enabling Customers to Bank Safe with HP
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one bank refocused their security energy towards data protection and customer experience management.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

TOGAF® and SABSA® Integration
sponsored by ComputerWeekly.com
IT BRIEFING: This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Posted: 05 Jan 2012 | Published: 11 Oct 2011

ComputerWeekly.com

Multiple Country Implementation — Influencing Factors and Approaches
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

ComputerWeekly.com

ESG: The Demand for Hybrid Online File Sharing Solutions
sponsored by Citrix
WHITE PAPER: This ESG will help you learn about recent changes in the OFS market, including the increasing demand for alternatives to the “one-size-fits-all,” cloud-based approach among current OFS users who leverage a cloud deployment model.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Citrix

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement