Search Results for: property

   All     White Papers   Multimedia   IT Downloads 
1 - 10 of 3880 Matches Previous Page  |  Next Page
Negotiating cloud contracts
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.

China Auto Industry Research - Inside China: The Chinese View Their Automotive Future
Automotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.

IBM Line of Business

Choosing visual properties for successful visualizations
In the following article, IBM experts address a key aspect in the design process.


Defending Web Properties From Modern Threats
Your applications are growing—and so are the threats. Discover how you can protect it all using just one solution.


Protecting Lives and Property With the Right Cabling Infrastructure
Did you know the right network infrastructure can help prevent or even mitigate a disaster? Find out how you can help protect your organization with the right cabling infrastructure in this white paper.


The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.

Dell ProSupport Certified Data Destruction
The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.

DellEMC and Intel®

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.

Pitney Bowes Group 1 Software

How to create an effective data protection strategy for IT compliance
Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

E-Guide: Monitoring Strategies for Insider Threat Detection
Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.

ArcSight, an HP Company
1 - 10 of 3880 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement