Building Security Operation CenterWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Building Security Operation Center returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Enterprise Systems Management
 •   Data Security
 •   Network Security
 •   Network Management
 •   Application Management and Maintenance
 •   Storage Management
 •   Security Monitoring
 •   Networks

Related Searches
 •   Building Providers
 •   Building Security Operation Quality
 •   Building Security Operation Webcasts
 •   Building Security Sales
 •   Downloads Building Security Operation
 •   Events Building Security Operation
 •   Forms Building Security
 •   Metrics Building Security Operation
 •   Payment Building
 •   Version Building
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Building a Successful Security Operations Center by ArcSight, an HP Company

December 01, 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC

December 30, 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

Building An Intelligence - Driven Security Operations Center by EMC Corporation

February 28, 2013 - (Free Research)
Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security. 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by IBM

December 30, 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 28, 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Web Ops 2.0: Achieving Fully Automated Provisioning by Puppet Labs

October 26, 2011 - (Free Research)
Today’s organizations need to get out of Web Operations 1.0, mired in legacy tools, outdated approaches, and low expectations, and into Web 2.0 where tools and procedures are built from the ground up for high quality efficiency, reliability, and agile operations. Access this paper to learn about fully automated provisioning for Web Operations 2.0. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services by Intel

February 29, 2012 - (Free Research)
A cloud environment can be hard to secure, but certain technology can mitigate your risks.This essential white paper focuses on establishing a robust foundation for the deployment of secure multi-tenancy operations. Learn about a set of hardware components that can help you build and maintain a chain of trust to protect your sensitive information. 
(WHITE PAPER)

E-Guide: Best Practices for Data Center Design and Maintenance by Dell, Inc. and Intel®

June 25, 2009 - (Free Research)
In this expert E-Guide, brought to you by SearchDataCenter.com and Dell, you will gain insight into best practices for data center design and maintenance in today's down economy. 
(EGUIDE) READ ABSTRACT |

Intel Cloud Builders Reference Architecture: Enhanced Cloud Security with HyTrust & Vmware by Intel

December 20, 2011 - (Free Research)
While many businesses are eager to adopt cloud computing, building a secure cloud infrastructure deployment and operation is still a challenge. Watch this video to learn about a combination of security technologies that can ensure your cloud environment is protected. 
(VIDEOCAST)

Cisco EnergyWise: Power Management Without Borders by Cisco Systems, Inc.

March 01, 2010 - (Free Research)
Cisco® EnergyWise is a new energy management architecture that will allow IT operations and facilities to measure and fine-tune power usage to realize significant cost savings. This white paper illustrates how businesses can utilize Cisco EnergyWise with a network enabled by Cisco to better understand the power footprint of their organization. 
(WHITE PAPER) READ ABSTRACT |

Modern Infrastructure July 2013 by SearchDataCenter.com

July 05, 2013 - (Free Research)
The July issue of Modern Infrastructure covers the challenges of private cloud adoption, along with endpoint management and top-notch server and network design. 
(EZINE) READ ABSTRACT |

FAQ Guide: How to Build an Efficient Data Storage Environment by FileTek, Inc. (E-mail this company)

April 18, 2012 - (Free Research)
This Q&A is here to help you get your storage on the right track - read on to discover how you can create a more efficient storage infrastructure today. 
(EGUIDE) READ ABSTRACT |

Building a Business Case for your Next-Generation QA Solution by Calabrio, Inc.

June 21, 2011 - (Free Research)
This white paper shows you how to build your business case and obtain approval for a new or upgraded contact center quality assurance and recording solution. 
(WHITE PAPER) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Understanding Architectural Priorities Inside Government Clouds by AMD

January 25, 2011 - (Free Research)
Not since the advent of the Internet has a technological concept achieved more attention than cloud computing. AMD’s server platform technology is uniquely tuned to address critical government requirements for reducing costs, simplifying operations and raising energy efficiency in server price/performance.  
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Data Protection 2.0: It’s Not Just Names and Numbers Anymore by Tripwire, Inc.

February 08, 2011 - (Free Research)
The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges. 
(WHITE PAPER) READ ABSTRACT |

Getting the Most from Your Wireless Network by WildPackets, Inc.

August 2008 - (Free Research)
Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee. 
(WHITE PAPER) READ ABSTRACT |

Build a Better Data and Recovery Backup Plan: The First Five Steps by Iron Mountain

February 2012 - (Free Research)
Check out this white paper for a complete backup breakdown. Included in this guide are the first five steps to take when building a data backup and recovery strategy, and best practices to help you develop and start improving your backups today. Read on for more. 
(WHITE PAPER) READ ABSTRACT |

Modernize your IT with an approach that's purpose built for your needs by VMware and IBM (E-mail this company)

October 2013 - (Free Research)
This guide explores the benefits of joint solutions featuring IBM's System x portfolio and VMware's vSphere with Operations Management. These two companies collaborated to develop solutions that address the individual needs and plans of organizations when it comes to cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Tesco's £65 million data centre strategy to drive online growth by ComputerWeekly.com

November 2012 - (Free Research)
This Computer Weekly case study, packed with photographs and data, gives the inside story of Tesco's £65 million data centre strategy. 
(CASE STUDY) READ ABSTRACT |

Presentation Download: Storage for Virtual Environments Presentation Download by Quantum Corporation

August 2011 - (Free Research)
Jon William Toigo – noted storage expert and industry watchdog – can help you sort it out. In this presentation download, Toigo identifies the big picture trends that are causing storage operations to burst at the seams – and he provides tactical advice on technologies and tactics that will help contain costs and optimize operations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Future of Business-Critical Networking by Cavalier

May 2010 - (Free Research)
Your network must deliver non-stop services to support business operations and be highly scalable to support future growth. It must also address multiple communications needs cost-effectively and flexibly. The communications network must meet the demands of a dynamic business-critical environment. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts