Buying Information Security ConferenceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Buying Information Security Conference returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   Managed Security Services
 •   Virtualization
 •   Wireless Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Buying Graphics
 •   Buying Information Case Studies
 •   Buying Information Need
 •   Buying Information Security Email
 •   Buying Information Security Marketing
 •   Buying Information Security Statement
 •   Buying Patent
 •   Code Buying Information
 •   Guidelines Buying
 •   Sheets Buying Information
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 18, 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 11 March 2014: Making data flow freely by ComputerWeekly.com

March 11, 2014 - (Free Research)
In this week's Computer Weekly, our latest buyer's guide looks at open data and how it can improve public services – and even help prevent a repeat of the recent floods. We report from Cloud Expo on the reasons why public cloud is yet to be embraced by enterprise IT. And we look at the key issues for buying HR software in 2014. Read the issue now. 
(EZINE) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 12, 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Finance and Technology: A Confident Partnership by Oracle Corporation UK Ltd

April 14, 2014 - (Free Research)
Access this exclusive report and uncover a complete list of findings from a recent IT and finance department related survey, and find out how large an input the finance staff really has in technology decision-making. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 28, 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

IBM Information On Demand Virtual 2010 by IBM

December 15, 2010 - (Free Research)
Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. 
(WEBCAST)

Infosecurity Europe 2014 by ComputerWeekly.com

February 24, 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 10, 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 09, 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

How Big Data Benefits Enterprise Information Security Posture by EMC Corporation

June 25, 2013 - (Free Research)
In this expert guide from SearchSecurity.com, industry experts at the RSA Conference 2013 explain how big data benefits enterprise information security posture and how your organization can take security big data to the next level. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 03, 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 14, 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

IBM Lotus Sametime Software Integration with Microsoft Applications: Connecting, Conversing and Collaborating More Conveniently by IBM

March 13, 2009 - (Free Research)
Check out this paper to learn about the many benefits of IBM Lotus Sametime software integration and how it can enhance the collaboration and unified communications capabilities of all your Microsoft Office applications. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – March Edition by ComputerWeekly.com

March 05, 2013 - (Free Research)
Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. 
(EZINE) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

The 2014 Endpoint Security Buyers Guide by Lumension

August 16, 2013 - (Free Research)
This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology. 
(WHITE PAPER) READ ABSTRACT |

The Best of RSA: Mobile Security by Kaspersky Lab

May 03, 2012 - (Free Research)
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies. 
(EGUIDE) READ ABSTRACT |

Cyber defense: Understanding and combating the threat by IBM

July 20, 2012 - (Free Research)
The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 05, 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 12, 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW+: Overview of the Open Group Security Forum by ComputerWeekly.com

October 19, 2010 - (Free Research)
The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts