Control TechnicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Control Technical returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Access Control
 •   Enterprise Data Protection and Privacy
 •   Authentication / Password Management
 •   Virtualization
 •   Wireless Security

Related Searches
 •   Consults Control Technical
 •   Control Article
 •   Control Strategies
 •   Control Technologies
 •   Frameworks Control Technical
 •   Functions Control Technical
 •   Internet-Based Control Technical
 •   Manage Control Technical
 •   Patent Control Technical
 •   Support Control Technical
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 23, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell, Inc.

October 22, 2013 - (Free Research)
This technical white paper details a set of best practices for configuring a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 06, 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Control Compliance Suite Trialware by Symantec Corporation

April 01, 2009 - (Free Research)
Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial. 
(DOWNLOAD)

Defender 5: The Right Way to Prove, Identify and Establish Trust by Dell Software

November 03, 2010 - (Free Research)
Are you certain each person accessing your network resources is who they say they are? In this Quest technical brief, learn how Defender 5 gives you more control over who has access to resources, applications and data – well beyond a simple login name and password. Defender 5. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Managing Identities and Access Control by SearchSecurity.com

February 24, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell and VMware

November 13, 2013 - (Free Research)
This technical white paper details a set of best practices for configuring storage in a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 21, 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 10, 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK) READ ABSTRACT |

Technical guide on Web Security Gateways by SearchSecurity.com

April 28, 2011 - (Free Research)
Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats. 
(EBOOK) READ ABSTRACT |

Migrating Oracle Application Setups – The Stat Way by Dell Software

May 31, 2012 - (Free Research)
Changes to your Oracle E-Business Suite applications directly affect your company. Therefore, having an effective change management and version control process is critical. In this paper, see how an impossible task – versioning and managing Oracle setup object with third-party tools – is now a reality. 
(WHITE PAPER) READ ABSTRACT |

Building an integrated workflow for quality control and compliance by Apriso Corporation

June 24, 2011 - (Free Research)
This eBook explains the technical and organizational issues involved in creating fully integrated quality control and data management systems for globalized manufacturers and distributors. 
(EBOOK)

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497) by Klocwork

November 08, 2013 - (Free Research)
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 01, 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Defender 5: The Right Way to Prove, Identify and Establish Trust by Dell Software

February 11, 2011 - (Free Research)
The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password. 
(WHITE PAPER) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 01, 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

Is Your Platform Secure? Really? by IBM

July 2013 - (Free Research)
This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives. 
(WHITE PAPER) READ ABSTRACT |

Deploying Software-Defined Networking: From Business Problem to a Technical Solution by SearchNetworking.com

November 2013 - (Free Research)
This expert decision center from SearchSDN.com takes an in-depth look at software-defined networking technology strategies and how they can help reduce the complexity and management of your network by enabling centralized programmable networks that separate the control and data planes from the underlying infrastructure. 
(WHITE PAPER) READ ABSTRACT |

IDC: Next - Generation Power and Cooling for Blade Environments by Hewlett Packard Company and Intel

December 2008 - (Free Research)
In this technical brief, IDC examines HP Thermal Logic, a holistic approach to improving power and cooling efficiency in the IT infrastructure, designed to help companies reduce energy consumption, reclaim unused datacenter capacity, and extend the life of their datacenter. 
(ANALYST REPORT) READ ABSTRACT |

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Securing Access to Resources in the Cloud:  What's Really Possible Today by FoxT

May 2010 - (Free Research)
This presentation transcript explores the cloud from both a business and technical perspective to show how organizations can benefit from cloud services while maintaining the control and auditing capabilities to remain secure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts