Cycle SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Cycle Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Product Life Cycle Management (PLM)
 •   Storage Management
 •   Data Center Management
 •   Information Lifecycle Management
 •   Vulnerability Assessment
 •   Network Security

Related Searches
 •   Cases Cycle
 •   Cycle Download
 •   Cycle Regional
 •   Cycle Security Capacities
 •   Example Of Cycle
 •   Guide Cycle
 •   Outsourcing Cycle
 •   Resource Cycle Security
 •   Scripts Cycle
 •   Systems Cycle
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Path to a Secure Application by IBM

December 01, 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Reducing Your Patch Cycle to Less Than 5 Days by Tenable Network Security (E-mail this company)

September 03, 2013 - (Free Research)
This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle. 
(WEBCAST) READ ABSTRACT |

Your Server Refresh Cycle: Ensuring Security by Dell, Inc. and Intel®

March 11, 2014 - (Free Research)
Access this concise resource to discover how the latest technological advances will help you keep data secure during a server refresh cycle. 
(RESOURCE) READ ABSTRACT |

Your server refresh cycle: Ensuring security by Dell, Inc. and Intel®

March 11, 2014 - (Free Research)
Explore this resource to learn how you can keep your assets secure during a server refresh cycle without breaking the bank. 
(WHITE PAPER) READ ABSTRACT |

Automated Life-Cycle Management: A Critical Enabler for Cloud-Ready Datacenters by IBM

May 01, 2013 - (Free Research)
This whitepaper explores the role that standards, automation, orchestration and advanced analytics play in optimizing the full datacenter operations life cycle across today’s dynamic datacenter environments. 
(WHITE PAPER) READ ABSTRACT |

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 13, 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Dynamic Application Infrastructure for Effective Private Cloud Computing by IBM

February 19, 2010 - (Free Research)
IBM WebSphere CloudBurst Appliance is a private cloud appliance that improves the speed and efficiency of the collaborative application life-cycle management process. Beyond the cost efficiency benefits, the goal of using this appliance is to speed up development and testing cycles and improve the quality of the application. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Efficient Management of Legal and Compliance Requests on D2D Storage by Index Engines

December 12, 2011 - (Free Research)
This white paper features today's best practices regarding efficient data management and provides you with the information you need to optimize your existing storage infrastructure and increase efficiency throughout your data center. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security by IBM

October 01, 2009 - (Free Research)
Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use. 
(CASE STUDY) READ ABSTRACT |

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

Presentation Transcript: Best Practices for Scheduled Security Update Cycle by GFI Software

May 2011 - (Free Research)
In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IT in Europe Virtual Data Centre Vol. 1, No. 3 Server Hardware and Refresh Cycle Options by SearchVirtualDataCentre.co.UK

September 2011 - (Free Research)
Virtualization has come a long way, and now IT pros are tasked with keeping their virtual machines secure. This expert e-zine follows the evolution of virtualization and offers advice for developing an effective security strategy. Plus, find out what took place at VMworld 2011 within the virtualization and cloud arenas. 
(EZINE)

z/OS Tape Encryption Security & Compliance Series: Identity, Access and Encryption by IBM

June 2008 - (Free Research)
Listen to this webcast to learn how your company can quickly and efficiently comply with recent security breach notification legislation, review implementation experiences from early adopters of this new technology, and have a plan of action. 
(WEBCAST) READ ABSTRACT |

E-Zine: THE GREEN AND VIRTUAL DATA CENTER - Chapter 4: IT Infrastructure Resource Management by SearchStorage.com

August 2009 - (Free Research)
Best practices, people, processes, and procedures combine with technology tools, hardware, software, networks, services, and facilities to enable a virtual data center. The importance of this chapter is to understand how all these elements coupled with existing and emerging technologies can be applied to improve IT service delivery. 
(EZINE)

Identify and Leverage Your Existing Service Life Cycles by IBM

December 2010 - (Free Research)
This executive brief will illustrate the progression of service management since the 1990s, illuminate the hidden service life cycles and discuss how, once they are visible, we can start to make them work — to improve services and better align IT with business objectives. 
(WHITE PAPER) READ ABSTRACT |

Closed Loop Lifecycle Planning©: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle by Hewlett-Packard Company

October 2008 - (Free Research)
This paper encourages all businesses, regardless of size and complexities, to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle. 
(WHITE PAPER) READ ABSTRACT |

Closed Loop Lifecycle Planning: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle by Hewlett-Packard Company

January 2008 - (Free Research)
This paper encourages all businesses to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle. The timing could not be better. There is also a business case to be made that the 'business as usual' environment could view the "green" initiative as a compelling event unto itself. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 29 January 2013: The end of the PC refresh cycle? by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now. 
(EZINE) READ ABSTRACT |

Warehouse Management Better Business Practices: Cycle and Annual Counting by VAI, Vormittag Associates, Inc.

February 2009 - (Free Research)
This first chapter of Better Business Practices Series, explores the many benefits of cycle counting. Chief among them is the elimination of an annual physical count of your inventory. While cycle counting is the preferred inventory counting process, many companies still conduct annual counts. 
(BOOK) READ ABSTRACT |

Securities and capital markets by IBM

July 2011 - (Free Research)
IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems. 
(WHITE PAPER) READ ABSTRACT |

Evaluate: IBM Rational AppScan by IBM

June 2011 - (Free Research)
With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

Managing Identities and Access in the Cloud by IBM

December 2011 - (Free Research)
Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data. 
(WHITE PAPER) READ ABSTRACT |

On the Safe Side: Managing Security in Mobile Apps by TechTarget

February 2014 - (Free Research)
Software development projects aren't always on top of the security management list, but when it comes to enterprise mobility applications, there's no question about its precedence. Take this survey to gain access to an e-book that highlights 7 tips to protect enterprise data and how to avoid the perpetual cycle of insecurity. 
(RESOURCE)

Reinventing your IT life-cycle management strategy by IBM

April 2013 - (Free Research)
View this white paper to learn why converged systems have the potential to radically improve many aspects of the IT life-cycle and how it can add to your business value. It provides many examples on how customers are reinventing their strategies to IT life-cycle management. 
(WHITE PAPER) READ ABSTRACT |

4 Customers Who Never Have to Replace Their PCs Again by Citrix

August 2013 - (Free Research)
This whitepaper highlights four use-cases in which four businesses used desktop virtualization in order to ensure a fully up-to-date experience for end-users on any type of endpoint – including low-cost thin clients. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts