Build Security CompaniesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Build Security Companies returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Managed Security Services
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Vulnerability Assessment
 •   Virtualization
 •   Endpoint Security
 •   Data Center Management

Related Searches
 •   Build Configuration
 •   Build General
 •   Build Security Companies Financial
 •   Build Security Companies Testing
 •   Build Security Repair
 •   Manufacturer Build Security
 •   Metrics Build Security Companies
 •   Procedures Build Security
 •   Review Build
 •   Test Build Security
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process by IBM

December 09, 2011 - (Free Research)
In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Improving software with the building security in maturity model by IBM

May 26, 2011 - (Free Research)
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time. 
(EGUIDE) READ ABSTRACT |

Mobile Application Security from HP - Build security into your mobile applications by Hewlett-Packard Limited

January 04, 2012 - (Free Research)
Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment. 
(WEBCAST) READ ABSTRACT |

Software Security Delivered in the Cloud by Hewlett-Packard Company

October 28, 2011 - (Free Research)
HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Securing the Next-Generation Data Center by McAfee, Inc.

August 11, 2011 - (Free Research)
Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation. 
(WHITE PAPER) READ ABSTRACT |

Five critical steps to achieving an effective application security program by IBM

December 31, 2013 - (Free Research)
This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes. 
(WHITE PAPER) READ ABSTRACT |

Security in the Cloud Planning Guide by Intel

September 01, 2011 - (Free Research)
Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected. 
(WHITE PAPER)

Keeping Networks safe from Social Networking by BlueCoat

November 21, 2011 - (Free Research)
Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking. 
(EGUIDE) READ ABSTRACT |

Managing Threat in a Digital Age by IBM

August 31, 2011 - (Free Research)
Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence." 
(WHITE PAPER) READ ABSTRACT |

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos, Inc.

December 2008 - (Free Research)
This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them. 
(WHITE PAPER) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Building a Tangible ROI for Data Quality by Harte-Hanks Trillium Software

March 2012 - (Free Research)
This white paper covers common issues and recommendations on building a business case for data quality initiatives. 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC

December 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

E-Book: Data Protection Plans for Complying with Privacy Laws by SearchSecurity.com & SearchCompliance.com

October 2010 - (Free Research)
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more! 
(EBOOK) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by IBM

December 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

FAQ: Building a DR site vs. outsourcing disaster recovery by SearchStorage.com

April 2013 - (Free Research)
Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more. 
(EGUIDE) READ ABSTRACT |

Building a Hybrid Storage Cloud by SearchStorage.com

February 2013 - (Free Research)
Access this exclusive Essential Guide from SearchCloudStorage.com to explore hype-free, expert insight into building a hybrid storage cloud. Inside, find articles on hybrid cloud storage products, the pros and cons of hybrid clouds, and learn about the true weak spots of the hybrid cloud model. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Why PayPal uses an internal PaaS by Red Hat

June 2013 - (Free Research)
Many companies are turning to Platform-as-a-Service (PaaS) in order to build and deploy applications quickly and easily. However, some businesses (including (PayPal) are hesitant to run on a public infrastructure -- due to security, compliance, and cloud vendor lock-in fears -- and instead choose to use an internal, on-premise PaaS. 
(CASE STUDY) READ ABSTRACT |

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by Tripwire, Inc.

January 2009 - (Free Research)
This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Taking the Next Step: How to Achieve Breakthrough Success in the IT Managed Services Business by Kaseya

April 2011 - (Free Research)
The drive to build a company from the ground up and offer a competitive product or service that fulfills a need is a powerful pull. Owners of IT service provider businesses are no different. Check out this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts