About Corporate SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: About Corporate Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Security Policies
 •   Endpoint Security
 •   Network Security
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Application Security

Related Searches
 •   About Corporate Files
 •   About Corporate Security Programs
 •   About Corporate Security Resources
 •   About Rfi
 •   About Speed
 •   Issues With About
 •   Learning About
 •   Manuals About Corporate Security
 •   Template About Corporate Security
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 18, 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

The CIO's Guide to Mobile Security by BlackBerry

October 2006 - (Free Research)
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data. 
(WHITE PAPER) READ ABSTRACT |

How Consumerization Affects Security and Compliance by SearchSecurity.com

February 2012 - (Free Research)
The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels. 
(EBRIEF) READ ABSTRACT |

How to Gain Visibility and Control of Encrypted SSL Web Sessions by BlueCoat

January 2006 - (Free Research)
Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications. 
(WHITE PAPER) READ ABSTRACT |

Applications and best practices to keep your mobile devices secure by SearchSecurity.com

March 2012 - (Free Research)
Uncover best practices for keeping your mobile devices and applications secure. 
(EGUIDE) READ ABSTRACT |

Overcoming the Modern Challenges to Corporate Records Management by Iron Mountain

August 2012 - (Free Research)
In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends. 
(PODCAST) READ ABSTRACT |

Cisco Email Security by Cisco Systems, Inc.

April 2014 - (Free Research)
This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them. 
(WHITE PAPER) READ ABSTRACT |

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network by Motorola, Inc.

May 2007 - (Free Research)
This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

Battling Modern Botnets in the Enterprise by FireEye

September 2008 - (Free Research)
The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business. 
(WHITE PAPER) READ ABSTRACT |

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption by Aladdin Knowledge Systems

August 2008 - (Free Research)
Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings by Trend Micro, Inc.

June 2011 - (Free Research)
3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection. 
(WHITE PAPER) READ ABSTRACT |

5 Things You Need to Know About iPad in the Enterprise by GroupLogic

September 2011 - (Free Research)
The increase of iPads in the work setting brings with it a number of security concerns and risks that enterprises must address. View this white paper to discover the top 5 things you need to know about iPads and integrating them into an enterprise setting, and explore how to protect your corporate assets and mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

Corporate Data in the Consumer Cloud, Chapter 1--ATB on Cloud Apps and Services by SearchSecurity.com

June 2013 - (Free Research)
This e-guide offers advice for organizations wanting to limit their risk of exposure of sensitive data in the consumer-drive cloud era. 
(EGUIDE) READ ABSTRACT |

Securing Corporate Data in the Age of Mobile Computing by SearchSecurity.com

January 2012 - (Free Research)
This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure. 
(EBOOK) READ ABSTRACT |

Top 5 Myths about Mobile Security by Sophos, Inc.

July 2013 - (Free Research)
This expert paper examines the top five myths about mobile security, detailing why these concepts are mistaken for truth and what you can do to appropriately alter your mobile security profile. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing by Dell, Inc. and Microsoft

August 2011 - (Free Research)
Access this paper to learn about five trends that are shaping the future of enterprise mobility, and get nine recommendations for the new era of enterprise mobility. Finally, learn how Dell is uniquely prepared to help customers embrace and manage consumerization and the challenges and risks that come with consumerization-related changes. 
(WHITE PAPER) READ ABSTRACT |

Brian Madden and BlackBerry's Alan Panezic discuss BlackBerry Mobile Fusion, Balance, and PlayBook 2.0 by BlackBerry

February 2012 - (Free Research)
Watch this 10 minute video to hear Brian Madden, blogger, and Alan Panezic, VP of Enterprise Product Management from BlackBerry, discuss the new offerings BlackBerry is giving to make sure employers and employees are happy with their mobile device capabilities. 
(VIDEO) READ ABSTRACT |

Presentation Transcript: Business Case for Data Protection Survey & Results by Ounce Labs, an IBM Company

October 2009 - (Free Research)
This presentation transcript presents the results of a survey conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company. The survey determines what senior executives think about the value proposition of corporate data protection efforts. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The State of Database Management by IBM

June 2008 - (Free Research)
Data managers are concerned about managing the explosion of data, and are looking for ways to manage the process. In this survey from IDUG, learn about improving database performance and overall corporate performance. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts