About Security AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: About Security Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Vulnerability Assessment
 •   Managed Security Services
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   About Industry
 •   About Security Assessment Expert
 •   About Security Assessment Mac
 •   About Security Assessment Records
 •   Configuration About Security
 •   Designing About
 •   Frameworks About Security
 •   Paper About Security
 •   Project About
 •   Workflow About Security
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution by McAfee, Inc.

November 02, 2010 - (Free Research)
For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance. 
(PRODUCT OVERVIEW) READ ABSTRACT |

The Malware Report: Hotel Business Center PCs Strike Again by ESET

August 20, 2009 - (Free Research)
Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely. 
(PODCAST) READ ABSTRACT |

It's All About Security: Things to Know Before You Open The Doors To Smartphones and Tablets in Your Enterprise by Sybase, an SAP company

June 01, 2011 - (Free Research)
This white paper discusses mobile device security threats and how IT can manage and secure devices. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to protect end users, their devices, and the network infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 01, 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

Seven Criteria for Evaluating Security as-a-Service (SaaS) Solutions by Websense, Inc.

November 15, 2010 - (Free Research)
This white paper examines the security challenges organizations are facing today; addresses misconceptions about Security as-a-Service (SaaS); and provides criteria to help you evaluate SaaS solutions. 
(WHITE PAPER) READ ABSTRACT |

Fact or Fiction Security Survival Guide by Lumension

February 02, 2009 - (Free Research)
This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 12, 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips to Keep Your Small Business Safe by Trend Micro, Inc.

November 17, 2010 - (Free Research)
Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 15, 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

HP Fortify on Demand - Enterprise Software Security in the Cloud by Hewlett-Packard Company

May 31, 2012 - (Free Research)
HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization. 
(WHITE PAPER) READ ABSTRACT |

Security Trends 2014 by Global Knowledge

February 21, 2014 - (Free Research)
In this resource, find out what you need to know about security trends in 2014. 
(WHITE PAPER) READ ABSTRACT |

Security Trends 2014 by Global Knowledge

February 21, 2014 - (Free Research)
In this resource, find out what you need to know about security trends in 2014. 
(WHITE PAPER) READ ABSTRACT |

About to Buy Guide: Spam/virus protection for Exchange by Mimecast

June 05, 2012 - (Free Research)
This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high. 
(EGUIDE) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by Citrix Systems, Inc. (E-mail this company)

March 12, 2013 - (Free Research)
This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more. 
(EGUIDE) READ ABSTRACT |

How to navigate the cloud securely and confidently by ComputerWeekly.com

November 23, 2010 - (Free Research)
Security is one of the most commonly cited barriers preventing IT managers from taking advantage of cloud computing – yet some experts say the cloud could and should be more secure than in-house IT. This paper looks at how to be confident about security in the cloud. 
(WHITE PAPER) READ ABSTRACT |

CW+: Quocirca report: Web retailing - keeping the orders flowing by ComputerWeekly.com

August 12, 2010 - (Free Research)
Whether it is selling books, groceries, gadgets or tickets, the volume of orders being taken online continues to grow. Ensuring that customers receive a prompt and personal experience, whilst remaining assured about security, is essential to the ongoing success of online retail. 
(WHITE PAPER) READ ABSTRACT |

Security Practices for Vmware by Vyatta Inc.

June 20, 2012 - (Free Research)
This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems. 
(WEBCAST) READ ABSTRACT |

The Health Care Cloud: Increasing the Need for Disaster Recovery by HP & Intel®

March 05, 2013 - (Free Research)
This e-guide explores how, as EHR vendors venture into the cloud, the need for improved disaster recovery and security policies is becoming more apparent. 
(EGUIDE) READ ABSTRACT |

Vendor Round Table: Cloud Security by Intel

October 03, 2011 - (Free Research)
<p>Transitioning to the cloud can introduce many security risks and data privacy challenges. This white paper provides key insights on how to evaluate cloud technology vendors so you can maximize your security in your new environment. Review a series of questions asked to nine cloud vendors and uncover what they reveal about current offerings.</p> 
(WHITE PAPER) READ ABSTRACT |

The New Learning Content Model: How Content Management Challenges Are Changing the Way Learning Content Is Purchased, Deployed and Managed by Plateau System LTD.

March 2008 - (Free Research)
With dynamic learning essential to meeting an entire new era of challenges, organizations simply can't afford to base their learning budget on their best guess about who, when, and how their employees will use eLearning content. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
This informative whitepaper takes a look current threat landscape and what you need to do to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Rethink Defense-In-Depth Security Model For BYOD by McAfee, Inc.

July 2013 - (Free Research)
This expert guide explains why endpoint defense-in-depth controls must assume the endpoint is compromised, and what paths you can take to get the most from your security system. 
(EGUIDE) READ ABSTRACT |

Turning Security Upside-down by Webroot

September 2011 - (Free Research)
This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defense strategy and learn how cloud-based solutions fit into the security technology market. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts