Data Security TestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Test returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Security Policies
 •   Vulnerability Assessment
 •   Enterprise Data Protection and Privacy
 •   Application Management and Maintenance
 •   Testing and Analysis

Related Searches
 •   Canada Data
 •   Change Data Security Test
 •   Data Security Rhode Island
 •   Data Security Test Case Study
 •   Data Security Test Organizational
 •   Data Security Test Pos
 •   Layer Data Security
 •   Measures Data Security
 •   Protocol Data Security Test
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Magic Quadrant for Application Security Testing by Hewlett-Packard Company

July 02, 2013 - (Free Research)
Access this in-depth analyst report from Gartner on the top vendors in application security testing (AST) to find out which category of testing your organization needs to protect against intensifying targeted attacks. 
(ANALYST REPORT) READ ABSTRACT |

2013 Magic Quadrant for Application Security Testing by IBM

July 23, 2013 - (Free Research)
This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market. 
(WHITE PAPER) READ ABSTRACT |

Application security testing: Protecting your application and data by IBM

November 07, 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 09, 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 13, 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Vulnerability Scanning and Compliance by Dell SecureWorks UK

August 22, 2011 - (Free Research)
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The IBM Rational AppScan Lifecycle Solution by IBM

July 2008 - (Free Research)
IBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges. 
(WHITE PAPER) READ ABSTRACT |

Security in Cloud Computing by CSC

January 2013 - (Free Research)
This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs. 
(EGUIDE) READ ABSTRACT |

Winning the PCI Compliance Battle by Qualys

October 2011 - (Free Research)
This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS. 
(WHITE PAPER) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

The Threat Landscape: A View from the Inside by Dell SecureWorks UK

October 2011 - (Free Research)
In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector by Dell SecureWorks UK

August 2011 - (Free Research)
Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Information Security - IT Decision Checklist: Application Security by Ounce Labs, an IBM Company

December 2009 - (Free Research)
Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer. 
(EGUIDE) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010 by Mimecast

October 2011 - (Free Research)
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment. 
(EBOOK)

eGuide: Agile Testing in the Cloud by IBM

November 2011 - (Free Research)
For test teams in some application development shops, cloud computing has broken down many of the limitations caused by testing on internal resources. This expert e-guide will cover how to use the cloud for improved Agile testing and how this move to the cloud may help conquer internal limitations. 
(EGUIDE) READ ABSTRACT |

Webinar: Create Secure Test and Dev Environments in the Cloud by RightScale

February 2010 - (Free Research)
In this webinar, you will lean how to operate your entire application testing infrastructure in the cloud to save time and money – enabling you to test more extensively and quickly hand off projects from development to operations. 
(WEBCAST) READ ABSTRACT |

E-Book: Exchange Server 2010: Migration and Testing by Iron Mountain.

July 2010 - (Free Research)
The buzz surrounding Microsoft Exchange Server 2010 isn’t just noise; however, new features fall short without proper setup. Get the lowdown on how to install, test, and protect your Exchange upgrade. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

Server Virtualization: A Game-Changer For SMB Customers by NETGEAR Inc.

November 2010 - (Free Research)
Server virtualization can address issues involving logistics and finances and also transform testing and development environments while radically changing business continuity and disaster recovery practices. Read this white paper to learn more about what server virtualization can do for you. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

EGuide: Testing Enterprise Firewalls by Sophos, Inc.

July 2013 - (Free Research)
In this expert guide from SearchSecurity.com, learn about the three types of firewall tests you should perform to ensure that the solution you end up selecting is the best for your organization's specific needs. 
(EGUIDE) READ ABSTRACT |

Keeping Up with PCI: Implementing Network Segmentation and Monitoring Security Controls by SonicWALL

February 2010 - (Free Research)
Read this expert e-guide to get tips on establishing a process for logging activity and tying records to users, learn three main requirements for testing security controls, and find out how to implement PCI network segmentation and how it may ease PCI compliance for your organization. 
(EGUIDE) READ ABSTRACT |

IBM Optim Data Privacy Solution for SAP by IBM

October 2008 - (Free Research)
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing. 
(ARTICLE) READ ABSTRACT |

Enabling Developer Access to Production Data by Voltage Security, Inc.

December 2008 - (Free Research)
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise. 
(WHITE PAPER) READ ABSTRACT |

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors by Webroot

January 2013 - (Free Research)
This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts