Data Security TestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Test returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Vulnerability Assessment
 •   Enterprise Data Protection and Privacy
 •   Testing and Analysis
 •   Application Management and Maintenance

Related Searches
 •   Based Data Security
 •   Commercial Data Security
 •   Contact Data Security
 •   Data Analyst
 •   Data Security Test Example
 •   Data Survey
 •   Fast Data Security
 •   Formats Data
 •   Schemas Data Security
 •   Template Data Security Test
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

2013 Magic Quadrant for Application Security Testing by IBM

July 23, 2013 - (Free Research)
This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market. 
(WHITE PAPER) READ ABSTRACT |

Application security testing: Protecting your application and data by IBM

November 07, 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 13, 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Vulnerability Scanning and Compliance by Dell SecureWorks UK

August 22, 2011 - (Free Research)
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 09, 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Security Testing For Financial Institutions by Ixia

January 31, 2014 - (Free Research)
Security breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis. 
(WHITE PAPER) READ ABSTRACT |

The IBM Rational AppScan Lifecycle Solution by IBM

July 2008 - (Free Research)
IBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges. 
(WHITE PAPER) READ ABSTRACT |

Security in Cloud Computing by CSC

January 2013 - (Free Research)
This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs. 
(EGUIDE) READ ABSTRACT |

Winning the PCI Compliance Battle by Qualys

October 2011 - (Free Research)
This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS. 
(WHITE PAPER) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

The Threat Landscape: A View from the Inside by Dell SecureWorks UK

October 2011 - (Free Research)
In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector by Dell SecureWorks UK

August 2011 - (Free Research)
Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Information Security - IT Decision Checklist: Application Security by Ounce Labs, an IBM Company

December 2009 - (Free Research)
Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer. 
(EGUIDE) READ ABSTRACT |

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010 by SearchDataCenter.com

October 2011 - (Free Research)
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment. 
(EBOOK) READ ABSTRACT |

eGuide: Agile Testing in the Cloud by IBM

November 2011 - (Free Research)
For test teams in some application development shops, cloud computing has broken down many of the limitations caused by testing on internal resources. This expert e-guide will cover how to use the cloud for improved Agile testing and how this move to the cloud may help conquer internal limitations. 
(EGUIDE) READ ABSTRACT |

Webinar: Create Secure Test and Dev Environments in the Cloud by RightScale

February 2010 - (Free Research)
In this webinar, you will lean how to operate your entire application testing infrastructure in the cloud to save time and money – enabling you to test more extensively and quickly hand off projects from development to operations. 
(WEBCAST) READ ABSTRACT |

E-Book: Exchange Server 2010: Migration and Testing by Iron Mountain.

July 2010 - (Free Research)
The buzz surrounding Microsoft Exchange Server 2010 isn’t just noise; however, new features fall short without proper setup. Get the lowdown on how to install, test, and protect your Exchange upgrade. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

EGuide: Testing Enterprise Firewalls by Sophos, Inc.

July 2013 - (Free Research)
In this expert guide from SearchSecurity.com, learn about the three types of firewall tests you should perform to ensure that the solution you end up selecting is the best for your organization's specific needs. 
(EGUIDE) READ ABSTRACT |

Keeping Up with PCI: Implementing Network Segmentation and Monitoring Security Controls by SonicWALL

February 2010 - (Free Research)
Read this expert e-guide to get tips on establishing a process for logging activity and tying records to users, learn three main requirements for testing security controls, and find out how to implement PCI network segmentation and how it may ease PCI compliance for your organization. 
(EGUIDE) READ ABSTRACT |

IBM Optim Data Privacy Solution for SAP by IBM

October 2008 - (Free Research)
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing. 
(ARTICLE) READ ABSTRACT |

Enabling Developer Access to Production Data by Voltage Security, Inc.

December 2008 - (Free Research)
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise. 
(WHITE PAPER) READ ABSTRACT |

Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation by IBM

December 2012 - (Free Research)
This whitepaper will help you gain an understanding of the comparative efficacy and performance of different intrusion prevention system (IPS) solutions. Read on to discover the findings of IPS product tests. 
(WHITE PAPER) READ ABSTRACT |

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors by Webroot

January 2013 - (Free Research)
This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts