Content Profile SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Content Profile Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Identity Management/ User Provisioning
 •   Enterprise Content Management (ECM)
 •   Security Monitoring
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security
 •   Intrusion Prevention Solutions
 •   Web Content Management and Publishing

Related Searches
 •   Content Design
 •   Content Method
 •   Content Profile Need
 •   Content Profile Security Methods
 •   Content Profile Security Publishing
 •   Content Profile Trend
 •   Design Content Profile
 •   Implementation Content Profile Security
 •   Test Content Profile
 •   Web-Based Content Profile Security
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine

January 01, 2009 - (Free Research)
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it. 
(EZINE)

Server and Application Protection - Behind the Lines by Trend Micro

February 01, 2009 - (Free Research)
For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Data Ingestor and Hitachi Content Platform Solutions Profile by Hitachi Data Systems

June 25, 2012 - (Free Research)
This short white paper explores how you can support data movement from distributed locations to a centralized infrastructure at the core. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Guide: Security Explorer for Exchange by ScriptLogic Corporation

August 27, 2009 - (Free Research)
Financial records, human resource data, customer profiles and more are just a few of the content types that could get in the wrong hands if the appropriate security controls are not in place. 
(WHITE PAPER) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

WebSense Security Lab: Zero-Day in Critical Vulnerability by Websense, Inc.

September 28, 2009 - (Free Research)
The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

This Month in the Threat Webscape for July 2009 by Websense, Inc.

September 01, 2009 - (Free Research)
In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. 
(VIDEO) READ ABSTRACT |

True Profiles: A Contemporary Method for Managing Customer Data by Unica Corporation - An IBM Company

May 04, 2011 - (Free Research)
As the internet changes the way of traditional marketing and communication, discover a “True Profile” as a means of understanding customer behavior, actions and preferences using analytics. Learn the 4 key components of True Profiles and the business benefits included. 
(WHITE PAPER) READ ABSTRACT |

Technology Profile: Cloud Building - Requirements for Private Clouds (Instrumentation and the Private Cloud) by Virtual Instruments

February 13, 2012 - (Free Research)
Check out this white paper for best practices and requirements when establishing a private cloud. Learn about the importance of efficiency, scalability and real-time awareness of your cloud environment, and discover what tools and technologies are currently available to ensure your private cloud is running smoothly and effectively. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit by ComputerWeekly.com

January 21, 2014 - (Free Research)
In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now. 
(EZINE) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 04, 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 04, 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 11, 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile by Polycom, Inc.

September 27, 2010 - (Free Research)
Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More! 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Driving Collaboration Efficiency - H.264 High Profile by Polycom, Inc.

September 15, 2010 - (Free Research)
Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  View this webcast to learn how Less Delivers Much More! 
(WEBCAST) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 23, 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations by Websense, Inc.

September 15, 2011 - (Free Research)
Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 12, 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 12, 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Become a social business on the cloud: IBM SmartCloud for Social Business collaboration services by IBM

April 16, 2012 - (Free Research)
This brief paper outlines a social business cloud solution that provides integrated e-mail, social business capabilities and third-party applications, all delivered through cloud computing. Learn how it offers a security-rich environment that will allow your business to become a social butterfly in addition to reducing costs and complexity. 
(WHITE PAPER) READ ABSTRACT |

Communication & collaboration in the Enterprise 2.0 world by Huddle

December 29, 2011 - (Free Research)
This informative paper describes enterprise 2.0, how you can make the leap from 1.0 to 2.0 as well as real-world examples of successfully engaging web content management. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts