Activity Monitoring Secure PolicyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Activity Monitoring Secure Policy returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Databases
 •   Virtualization
 •   Fraud Detection & Prevention

Related Searches
 •   Activity Documentation
 •   Activity Monitoring Secure License
 •   Activity Monitoring Secure Performance
 •   Activity Monitoring Time
 •   Activity Reservation
 •   Financial Activity Monitoring Secure
 •   Function Of Activity Monitoring
 •   Metrics Activity Monitoring Secure
 •   Proposals Activity Monitoring
 •   Us Activity Monitoring
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

CW+: Analyst's take: Cyber-Ark benefits privileged account management by ComputerWeekly.com

December 31, 2010 - (Free Research)
Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities.  Cyber-Ark enables organizations to increase administrator productivity while reducing risk. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 16, 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Are Your File Transfer Methods Compliant? by OpenText

October 18, 2013 - (Free Research)
This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity. 
(WHITE PAPER) READ ABSTRACT |

When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption by WatchGuard Technologies, Inc.

February 24, 2011 - (Free Research)
WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data. 
(TECHNICAL ARTICLE) READ ABSTRACT |

How To Secure Online Activities by Global Knowledge

July 30, 2013 - (Free Research)
The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise. 
(WHITE PAPER) READ ABSTRACT |

Take Control with Fluke Networks by Fluke Networks.

August 19, 2013 - (Free Research)
With the trend of mobile computing and bring your own device (BYOD) policies, it is common for many people to work from remote locations. This video highlights how centralized monitoring can optimize and secure your network, leading to a better end-user experience. 
(WEBCAST)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Securing Virtualized Environments and Accelerating Cloud Computing by CA Technologies.

June 18, 2010 - (Free Research)
There is no question that virtualization offers compelling tangible benefits for an IT organization. Virtualization is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualization security, the CA Technologies Access Control (AC) solution, and how to accelerate cloud computing. 
(WHITE PAPER) READ ABSTRACT |

ActivEcho Trial Download by Acronis

October 17, 2013 - (Free Research)
activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try. 
(PRODUCT DEMO) READ ABSTRACT |

PowerBroker Password Safe: Security, Compliance, Productivity by BeyondTrust Corporation

April 29, 2013 - (Free Research)
Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business. 
(TRIAL SOFTWARE) READ ABSTRACT |

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 09, 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Data Discovery and Risk in the Datacenter by Tizor

October 2008 - (Free Research)
Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

CA Compliance Manager for z/OS by CA Technologies.

May 2009 - (Free Research)
Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk. 
(WEBCAST) READ ABSTRACT |

X-Force Mid-Year Trend Report by IBM

January 2012 - (Free Research)
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. 
(ANALYST REPORT) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Ovum: Corporate eGRC update by RSA, The Security Division of EMC

December 2010 - (Free Research)
This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Company

May 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security by LogRhythm, Inc.

September 2013 - (Free Research)
Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization. 
(WEBCAST) READ ABSTRACT |

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation

March 2009 - (Free Research)
This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators. 
(WHITE PAPER) READ ABSTRACT |

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.

December 2008 - (Free Research)
Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall. 
(ARTICLE) READ ABSTRACT |

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security? by CA Technologies.

May 2012 - (Free Research)
Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts