Audits Ways To SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Audits Ways To Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Policies
 •   Access Control
 •   Network Security
 •   Security Monitoring
 •   Virtualization
 •   Application Security

Related Searches
 •   Audits Ways Files
 •   Audits Ways Pennsylvania
 •   Audits Ways To Arizona
 •   Audits Ways To List
 •   Audits Ways To Montana
 •   Audits Ways To Profile
 •   Call Audits Ways To
 •   Device Audits
 •   Layout Audits
 •   Notes About Audits
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

5 Ways To Secure Removable Media: Which Is Best For Your Enterprise? by WinMagic

March 2010 - (Free Research)
This paper reviews the steps some organizations are taking to draft, implement, and enforce risk mitigation policies for removable media, and how technologies available today, and appearing on the horizon, are helping. 
(WHITE PAPER) READ ABSTRACT |

Security Intelligence is the Smart Way to Keep the Cloud Safe by IBM

October 2013 - (Free Research)
This guide explores a unique security intelligence platform and how it can secure your cloud. 
(WHITE PAPER) READ ABSTRACT |

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos, Inc.

December 2008 - (Free Research)
This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them. 
(WHITE PAPER) READ ABSTRACT |

Top Mobile Data Protection Best Practices by McAfee, Inc.

November 2011 - (Free Research)
Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours. 
(EGUIDE) READ ABSTRACT |

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos UK

March 2009 - (Free Research)
The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them. 
(WHITE PAPER) READ ABSTRACT |

Handbook: The Network without Borders by SearchNetworking.com

October 2013 - (Free Research)
This handbook looks at how to design and manage the new endpoint-driven network and extend secure access to private and public cloud services and virtual applications. 
(EGUIDE) READ ABSTRACT |

Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs by Apani

November 2008 - (Free Research)
This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management. 
(WHITE PAPER) READ ABSTRACT |

Enterprises Have Room for Improvement in Secure IT Asset Disposition by Iron Mountain

December 2013 - (Free Research)
Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – March 2014 by SearchSecurity.com

March 2014 - (Free Research)
In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation. 
(EZINE) READ ABSTRACT |

Top 10 Reasons Desktop Virtualization Can Enhance Security by Citrix

December 2013 - (Free Research)
This resource details the major components that make desktop virtualization secure by design. 
(WHITE PAPER) READ ABSTRACT |

Maintaining security in managed services by SecureWorks

December 2011 - (Free Research)
Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model. 
(EGUIDE) READ ABSTRACT |

Retailer Maximizes ROI on Digital Investments with Agility and Self-service by SnapLogic

December 2013 - (Free Research)
In this brief case study, learn how a major retailer leveraged a cloud-based integration technology to achieve rapid integration of social media data across a variety of channels. Explore their integration strategy and discover the other benefits they experienced. 
(CASE STUDY) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation

March 2009 - (Free Research)
This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualized Data Centers by Trend Micro, Inc.

December 2009 - (Free Research)
On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers. 
(EBOOK) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Realizing Business Value in Managed File Transfer by GlobalScape

April 2008 - (Free Research)
Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

From Secure Virtualization to Secure Private Cloud by VMware, Inc.

February 2012 - (Free Research)
The way in which enterprises provision and deliver security services must evolve in order to secure private cloud computing.  This paper explores the subject of security as enterprises move beyond virtualizing their data centers to build private cloud-computing infrastructures and outlines the foundational capabilities that are required. 
(WHITE PAPER) READ ABSTRACT |

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation by Linoma Software

July 2008 - (Free Research)
In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma. 
(CASE STUDY) READ ABSTRACT |

Preventing Data Loss: 10 Key Imperatives by Varonis

August 2007 - (Free Research)
This white paper describes the Varonis approach to data protection, which centers on the notion of data governance -- a comprehensive means to see, control and audit all aspects of unstructured data access. 
(WHITE PAPER) READ ABSTRACT |

Which Way to the Vault? Hassle-free Tape Backups by Iron Mountain

February 2012 - (Free Research)
Loaded with a step-by-step list of how to prepare, move and keep tabs on your data, along with four best practices for moving data to an offsite vault, this resource has the information you need to ensure you're properly transporting and managing offsite tapes. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts