Software  >   Applications Software  >   Consumer Applications Software  >  

Productivity Software

RSS Feed   
Productivity Software Reports
 
Building a Small Office Network: Getting Started
sponsored by Cisco Systems, Inc.
WHITE PAPER: Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

IDC White Paper: Effective Information Security
sponsored by CA (India) Technologies Pvt. Ltd
ANALYST REPORT: Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
Posted: 29 Apr 2010 | Published: 25 Sep 2009

CA (India) Technologies Pvt. Ltd

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

BlackBerry Enterprise Server for Microsoft Exchange
sponsored by BlackBerry
WHITE PAPER: The BlackBerry® services are designed to provide productivity tools—such as email, instant messaging, and personal information management (PIM) functionality—and data from enterprise applications to mobile users.
Posted: 11 Aug 2006 | Published: 01 Aug 2006

BlackBerry

An Overview and Competitive Analysis of the One-Time Password (OTP) Market
sponsored by RSA
WHITE PAPER: The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Posted: 14 Oct 2010 | Published: 14 Oct 2010

RSA

DATA Act Protection: Effects of a Federal Breach Notification Law
sponsored by CDW Corporation
EGUIDE: This E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

CDW Corporation

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Applying Software-Defined Security to the Branch Office
sponsored by Versa Networks
WHITE PAPER: The end goal of deploying software-defined security (SD-Security) for your branch offices is to have additional layers of security for better defense-in-depth, when and where you need them. Read this white paper to learn how you can apply SD-security to your branch office.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

Versa Networks

Embedded Analytics Are a True Multiplier to the Value of Your Application
sponsored by Yellowfin
WHITE PAPER: Download this white paper to learn how the dependence on analytics will impact your business processes, and explore a checklist of what to look for in an embedded analytics provider.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Yellowfin

Top 6 API Security Needs for Serverless Apps
sponsored by Data Theorem
WHITE PAPER: The growth in serverless apps is going to accelerate because the cost and time benefits for developers are overwhelmingly positive. However, the 6 areas in this white paper highlight the need for a new approach to security with an architecture that is substantially different than previous techniques. Read on to learn more.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Data Theorem
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement