> Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 226 - 250 of 2281Sort Results By: Published Date | Title | Company Name
White Paper Published By: CDW     Published Date: Jan 07, 2015
Learn how Microsoft’s end of support for its 2003 Windows Server presents the best opportunity for a technology upgrade and see what your organization should do to take advantage of this unique opportunity.
Tags : 
server, performance, migrating systems, technology, update
    
CDW
White Paper Published By: CDW     Published Date: Dec 29, 2014
Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.
Tags : 
server, data center, transformation, scalability, performance
    
CDW
White Paper Published By: CDW     Published Date: Dec 29, 2014
Learn how to reap the benefits of an operating system migration and see how you can transition to a modern data center to accommodate the latest technologies in order to increase the efficiency and productivity of your IT team.
Tags : 
server, data center, transformation, scalability, performance
    
CDW
White Paper Published By: CDW     Published Date: Dec 29, 2014
Learn why the time is now for data center transformation due to the end of Microsoft support to Windows Server 2003 and see what your organization must do to upgrade performance, scalability, availability, manageability, and security.
Tags : 
server, data center, transformation, scalability, performance
    
CDW
White Paper Published By: CDW     Published Date: Aug 07, 2013
In the spring of 2012, IBM® introduced its PureSystems family of intelligent, integrated, powerful and flexible computing systems. At that time, IBM committed to a continuing process of improvement and additions to these systems as technology and innovation evolved.
Tags : 
cdw, ibm, pureflex, datacenter, datacenter management
    
CDW
White Paper Published By: CDW     Published Date: Jul 30, 2013
Leaders in Today's Collaborative Revolution Report Significant Benefits From a Cloud-Based Approach.
Tags : 
cdw, cloud, cloud computing, video-conferencing, cloud-delivered
    
CDW
White Paper Published By: CDW     Published Date: Jul 18, 2013
Managing essential enterprise tools for greater productivity and cost savings.
Tags : 
cdw, software management, software lifecycle, software affects, security
    
CDW
White Paper Published By: CDW     Published Date: Jul 18, 2013
Understanding The Complications of Software License Management
Tags : 
cdw. software, software management, software audits, it organizations, license compliance
    
CDW
White Paper Published By: CDW     Published Date: Jul 18, 2013
Managing Software Resources Saving money, boosting productivity and reducing management headaches.
Tags : 
cdw, software management, software lifecycle, software assets, security
    
CDW
White Paper Published By: CDW     Published Date: Jul 11, 2013
In government, Big Data presents both a challenge and an opportunity that will grow over time.
Tags : 
cdw, big data, electronic records, cloud, cloud services
    
CDW
Free Offer Published By: CDW     Published Date: Jul 11, 2013
BI and Big Data: A Dark Territory
Tags : 
cwd, cdw blog, business intelligence, big data, security
    
CDW
White Paper Published By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : 
cdw, byod, bring your own device, mobile computing, smartphones
    
CDW
White Paper Published By: CDW     Published Date: Jun 18, 2013
A mix of well-thought-out policies and up-to-date technologies are needed to protect critical data.
Tags : 
cdw, mobile security, protecting data, critical data. notebooks, smartphones
    
CDW
White Paper Published By: CDW     Published Date: Jun 18, 2013
Boosting productivity and efficiency enterprisewide — from applications and infrastructure to internal and external users.
Tags : 
cdw, mobile solutions, mobile strategy, wireless strategies, security
    
CDW
White Paper Published By: CDW     Published Date: Jun 18, 2013
It’s an ever-evolving world of operating systems. Endless endpoints. Many media-rich applications. Bottlenecks and limited bandwidth.
Tags : 
cdw, red report, mobile technology, security
    
CDW
White Paper Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats
    
CDW
White Paper Published By: CDW     Published Date: Jun 10, 2013
It’s critical to understand how a defense-in-depth strategy can protect the most precious information asset: data.
Tags : 
cdw, enterprise encryption, defense-in-depth, sensitive data, security posture
    
CDW
White Paper Published By: CDW     Published Date: Jun 10, 2013
Nothing puts your organization at risk like weak network security. We’ve got the people, processes and partners to deploy your first line of defense.
Tags : 
cdw, threat detected, denial of service, viruses, worns
    
CDW
White Paper Published By: CDW     Published Date: Dec 03, 2012
We get the issues - as mobility is taking productivity to new places, complexity is taking IT departments for a ride. Read this white paper to learn how CDW can help deliver the solutions to meet your mobile application management needs.
Tags : 
cdw, mobile application management, mam, security, mobile workers
    
CDW
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg
    
CDW Symantec
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection
    
CDW Symantec
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec
    
CDW Symantec
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
As Tarkett Inc. continued to enjoy years of growth they realized their data center was in dire need of an update. It was strewn across eight locations with aging equipment and limited backup power. Tarkett turned to CDW to update and optimize their data center without affecting day-to-day business.
Tags : 
tarkett, case, study, optimizing, data
    
CDW Vmware
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : 
quick, start, data, recovery, vmware
    
CDW Vmware
White Paper Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW-HPE Servers
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com