Searching all of TechTarget| 8,894 results for "introduction"

SearchSecurity

By Karen Scarfone Get Started Jul 28, 2015

Introduction to SIEM services and products

Expert Karen Scarfone examines security information and event management systems and explains why they are crucial for enterprise security. Continue Reading

SearchCIO

By Linda Tucci News Jul 24, 2015

The platform business model: An introduction

Airbnb does it; Uber does it. What about your organization? Sangeet Paul Choudary lays out the fundamentals of the platform business model. Continue Reading

SearchSecurity

By Ed Tittel Get Started Aug 20, 2015

Introduction to Web fraud detection systems

Expert Ed Tittel explores the purpose of Web fraud detection systems and services, which are designed to reduce the risks inherent in electronic payments and e-commerce. Continue Reading

SearchServerVirtualization

By Brien Posey Get Started Jul 01, 2015

Introduction to virtualization systems management tools

Expert Brien Posey discusses what virtualization systems management is used for and how it can help organizations with large and complex infrastructures. Continue Reading

SearchSecurity

By Adrian Lane Get Started Jun 16, 2015

Introduction to database security tools for the enterprise

Expert Adrian Lane explains why database security tools play a significant, if not the majority, role in protecting data in the enterprise data center. Continue Reading

SearchSecurity

By Bill Hayes Get Started Jun 04, 2015

Introduction to data loss prevention products

Expert Bill Hayes describes how data loss prevention (DLP) products can help identify and plug information leaks and improve enterprise security. Continue Reading

SearchSecurity

By Karen Scarfone Get Started May 18, 2015

Introduction to email security gateways in the enterprise

Email security gateways protect enterprises from threats such as spam and phishing attacks. Expert Karen Scarfone explains how these products get the job done. Continue Reading

SearchSecurity

By Ed Tittel Get Started May 06, 2015

Introduction to unified threat management appliances

Expert Ed Tittel describes unified threat management (UTM) appliances and features, and explains its advantages to organizations of all sizes. Continue Reading

SearchSecurity

By Karen Scarfone Get Started Apr 20, 2015

Introduction to SSL VPN products in the enterprise

Virtual private networks secure the confidentiality and integrity of network communications. Expert Karen Scarfone explains how SSL VPN products work. Continue Reading

SearchSecurity

By Matthew Pascucci Get Started Mar 31, 2015

Introduction to mobile device management products

Expert Matt Pascucci describes how implementing mobile device management products can protect smartphones and tablets, as well as enterprise networks and infrastructures. Continue Reading