Accounting
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >    Search within results  

Your search for keyword: VPN Journal Paper returned 567 results.
 
ALL RESULTS SOFTWARE SERVICES & RESELLERS HARDWARE RESEARCH LIBRARY
 
Topics Related to Your Search

VPN, Extranet and Intranet Solutions | Network Security | Network Management | WAN/ LAN Solutions | Networks | Data Security | Endpoint Security | Content Delivery Networks/ Web Application Acceleration | SSL VPN | Application Security

Search Results 1 - 25 of 459 | Next Page
Too many results? Filter by:
Journal of Management Excellence: Building Trust by Oracle Corporation

July 16, 2009 - (Free Research) It is crucial for businesses to build trust with their customers, partners, investors, and with society at large. This journal article discusses building trust through modern performance management techniques, sustainability initiatives, managing reputation risk, end-to-end approaches to financial reporting and compliance, and more.
(JOURNAL ARTICLE) VIEW ABSTRACT | GO TO

Journal of Management Excellence - Enterprise Performance Management Innovations by Oracle Corporation

April 01, 2010 - (Free Research) This collection of journal articles focuses on the many facets of enterprise performance management that can help organizations thrive through the recovery, including; integrating the financial close and reporting process, managing the transition to IFRS, centralized enterprise dimension management.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Emerging Multicast VPN Applications by Juniper Networks, Inc.

November 2008 - (Free Research) This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)GO TO DETAILED REPORT

Customer Stories: Plenty of Fish by PEER 1

January 2008 - (Free Research) The site has continued growing astronomically ever since and is now the No. 1 free online dating site in the world, averaging 8 million unique visitors per month.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)GO TO DETAILED REPORT

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)GO TO DETAILED REPORT

WAN Optimization in MPLS Networks - The Transparency Challenge by Expand Networks

March 2008 - (Free Research) Today's modern Wide Area Networks (WANs), such as MPLS networks, provide much more than just a framework for information transport.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

WAN Speak Musings – Volume III by ComputerWeekly.com

November 2013 - (Free Research) Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
(ANALYST REPORT) VIEW ABSTRACT | GO TO ANALYST REPORT

IT Decision Checklist: Remote Access by VirtualArmor

March 2010 - (Free Research) The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
(EGUIDE) VIEW ABSTRACT | GO TO

The 10 Worst Practices for Technical Support and How to Overcome Them by NTR Global

October 2009 - (Free Research) This white paper will explore 10 of the "worst practices" that are common to customer support operations. We will discuss how these worst practices can creep in to your contact center and ways to deal with them. We will also touch on how to eliminate well‐intentioned management blunders and discuss good and bad uses of support technology.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Guarding Against Network Failure by Hughes Network Systems (E-mail this company)

August 2011 - (Free Research) Network outages can affect a single branch or the entire business. Access this paper on best practices for developing an optimal disaster recovery strategy.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Real-Time Transaction Inspection by Oversight Systems

Oversight Systems automates the analysis and testing of auditors and fraud examiners to reduce ongoing Sarbanes-Oxley compliance costs and provide quality assurance for financial operations. 
(SOFTWARE PRODUCT)GO TO DETAILED REPORT

Benchmarking the Social Intranet by Jive Software

July 2013 - (Free Research) Social business is a relatively new phenomenon. How should your business go about quantifying the success of adoption figures? This resource offers some key insights into the adoption rates of companies ranging from education to finance.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Building Compliance and Security into an Application Delivery Framework by Citrix

April 2008 - (Free Research) The right IT solution, such as Citrix Delivery Center™, offers a holistic approach to delivering compliance and security.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot

September 2009 - (Free Research) This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Optimizing Media-Rich Content Delivery with Point-to-Multipoint Label Switched Paths by Juniper Networks, Inc.

November 2008 - (Free Research) This document describes how content delivery and broadcast services are challenging networks and explains how emerging technologies such as point-to-multipoint (P2MP) label switched paths (LSPs) help resolve them.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

The Application Usage and Risk Report by Palo Alto Networks

June 2010 - (Free Research) The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 2012 - (Free Research) Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
(ANALYST REPORT) VIEW ABSTRACT | GO TO ANALYST REPORT

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research) Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense.
(PRESENTATION TRANSCRIPT) VIEW ABSTRACT | GO TO

Vault-Like Protection for 200 Financial Services Locations by WatchGuard Technologies, Inc.

October 2009 - (Free Research) Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
(CASE STUDY) VIEW ABSTRACT | GO TO CASE STUDY

Network Evolution E-Zine: Network security in a world of mobile workers by SearchNetworking.com

March 2012 - (Free Research) In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
(EZINE) VIEW ABSTRACT | GO TO

Hedge Fund Administration Provider Increases Efficiency by Cisco Systems, Inc.

January 2011 - (Free Research) HedgeServ, a provider of administration solutions to hedge funds and related financial enterprises faced the challenge of finding the best way to scale automation in their production environment. Needing a full-featued enterprise scheduler, HedgeServ decided to deploy Cisco Tidal Enterprise Scheduler. Continue reading to learn more.
(CASE STUDY) VIEW ABSTRACT | GO TO CASE STUDY

Total Economic Impact™ Of Silver Peak’s WAN Optimization Solution by Silver Peak

September 2010 - (Free Research) The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Silver Peak’s WAN optimization solution on their organizations. Forrester’s aim is to clearly show all of the calculations and assumptions used in the analysis.  Read this study to learn so much more.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

Achieving Profitable Growth through Exceptional Customer Experience by CA Technologies.

November 2008 - (Free Research) In this whitepaper, Datamonitor focuses on nine key steps that can - and should - be taken by CSPs to improve standards by delivering outstanding service and achieving various objectives.
(WHITE PAPER) VIEW ABSTRACT | GO TO WHITE PAPER

1 - 25 of 459 | Next Page

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


More Related Searches...
>  Building VPN Journal Paper

>  Configuration VPN Journal

>  Cycle VPN

>  Experts VPN Journal

>  Features VPN

>  Improve VPN Journal

>  Lists VPN Journal Paper

>  Media VPN

>  Product VPN Journal

>  Requirements VPN Journal

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts