Case Automate SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Case Automate Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Security Monitoring
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Managed Security Services
 •   Application Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy

Related Searches
 •   About Case Automate
 •   Applications Of Case Automate Security
 •   Case Automate Security Address
 •   Case Computers
 •   Case Customer
 •   Case Managing
 •   Free Case
 •   Organizational Case Automate Security
 •   Part Case Automate Security
 •   Testing Case
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Lumension Vulnerability Scanner Offer by Lumension

March 2009 - (Free Research)
This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes. 
(ASSESSMENT TOOL) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension

October 2009 - (Free Research)
This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance. 
(WHITE PAPER) READ ABSTRACT |

Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance by Lumension

January 2008 - (Free Research)
Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective. 
(CASE STUDY) READ ABSTRACT |

HP Network Automation 9.00 Evaluation by Hewlett-Packard Company

July 2010 - (Free Research)
HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks. 
(TRIAL SOFTWARE) READ ABSTRACT |

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation by Linoma Software

July 2008 - (Free Research)
In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma. 
(CASE STUDY) READ ABSTRACT |

Avoiding 7 Common Mistakes of IT Security Compliance by Qualys, Inc.

April 2009 - (Free Research)
This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals. 
(EGUIDE) READ ABSTRACT |

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension

March 2009 - (Free Research)
Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for Dummies by Qualys, Inc.

October 2009 - (Free Research)
Compliance with the Payment Card Industry (PCI) Data Security Standard (DSS) is mandatory if your company stores, processes, or transmits payment cardholder data. This book is all about understanding PCI and how merchants can comply with its requirements. 
(EBOOK) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Blue Coat Accelerates Automated CLI Testing, Reaps New Efficiencies with FanfareSVT by Fanfare

December 2006 - (Free Research)
Blue Coat needed to improve its test automation practices with tools & solutions that automate test cases during the development phase, increase test coverage, & identify changes that are not easily identified from build to build. Read why Blue Coat selected FanfareSVT test automation software to work seamlessly within its existing infrastructure. 
(CASE STUDY) READ ABSTRACT |

Automated Compliance: Making the Case and Reaping the Rewards by Tripwire, Inc.

March 2009 - (Free Research)
Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009. 
(PODCAST) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Case Study: Panda Security and Aloq, IT reseller by Panda Security

July 2013 - (Free Research)
Read about an IT reseller organization which was able to use a cloud systems management solution in order to automate tasks and streamline IT management, saving time and ensuring a high-quality end user experience. 
(CASE STUDY) READ ABSTRACT |

The Business Case for Data Security by Imperva

March 2011 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Case Study: Baltika Breweries Implements Safe File Exchange System by GlobalScape

May 2014 - (Free Research)
This case study follows Baltika Breweries' experience with a comprehensive file transfer platform that could accommodate their growing security requirements. 
(CASE STUDY) READ ABSTRACT |

Analyst Report: Case Management Automation - Facilitating Compliance by EMC Corporation

September 2010 - (Free Research)
Read this white paper to learn about the compliance implications of case-based process automaiton. 
(WHITE PAPER) READ ABSTRACT |

Gamania Group tightens security to strengthen game development capability by Hewlett-Packard Company

October 2012 - (Free Research)
Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts