Data Security VersionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Version returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Virtualization
 •   Storage Management
 •   Wireless Security
 •   Backup Systems and Services
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Consults Data Security Version
 •   Data Hr
 •   Data Security Making
 •   Data Security Offices
 •   Data Security Version Comparisons
 •   Full Data Security Version
 •   Licenses Data Security
 •   Method Data Security Version
 •   Organization Data Security
 •   Part Data Security Version
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 17, 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

Essential Guide to PCI DSS by Information Security Magazine

September 14, 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

Essential Guide to PCI DSS by SearchSecurity.com

September 14, 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

Discover What’s New in Oracle Data Integrator and Oracle GoldenGate by Oracle Corporation

August 18, 2011 - (Free Research)
Join Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate. 
(WEBCAST) READ ABSTRACT |

Platform-as-a-Service Private Cloud with Oracle Fusion Middleware (Spanish version) by Oracle Corporation

October 01, 2009 - (Free Research)
Download this free white paper to learn how platform-as-a-service private cloud offers enterprises one of the best ways to take advantage of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: PCI DSS v1.2: Best Practices and Useful Tips by ESET

January 15, 2010 - (Free Research)
While there are multiple regulatory compliance standards, the Payment Card Industry Data Security Standard (PCI DSS) addresses a sector with the greatest number of data breaches. Check out this Presentation Transcript to discover key differences between PCI DSS version 1.1 and 1.2, best practices for ensuring compliance, and tips. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Achieving a Higher Level of Business and Network Adaptability with Unified Application Infrastructure Services by F5 Networks

December 2004 - (Free Research)
Although F5's BIG-IP traffic management solutions brings numerous features and benefits to an organization, the goal of this paper is to explore a more fundamental business problem plaguing today's organizations - and how BIG-IP solves it. 
(WHITE PAPER) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

July 2009 - (Free Research)
Many network monitoring products are easy to install and give you basic tools for managing your network, but achieving and maintaining compliance with the latest version of the PCI DSS requires a network solution that can manage unprecedented levels of change and complexity. Read this whitepaper to learn more about one such solution. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Active Directory Backup and Recovery in Windows Server 2008 by Dell Software

March 2008 - (Free Research)
How will Windows Server 2008 affect your Active Directory environment? This white paper details backup and recovery in Windows Server 2008 and offers tips on how to protect your Active Directory. 
(WHITE PAPER) READ ABSTRACT |

Eliminating Database Downtime When Upgrading from Oracle 8i or 9i to 10g or 11g by GoldenGate Software, Inc.

January 2009 - (Free Research)
This paper presents a solution that tackles the challenge of upgrading or migrating an Oracle 8i or 9i database to Oracle 10g or 11g - without taking any database downtime. Key technology components used are GoldenGate Software's Transactional Data Management (TDM) software and Oracle's Cross Platform Transportable Tablespace feature. 
(WHITE PAPER) READ ABSTRACT |

Advanced Project Version Management in Schlumberger Petrel Platform Environments with Hitachi Storage Adapter for Petrel by Hitachi Data Systems

August 2013 - (Free Research)
This resource profiles a storage adapter for advanced project management that can help you optimize exploration and development operations, reduce storage management complexity and TCO, and more. 
(WHITE PAPER) READ ABSTRACT |

ISACA PCI Compliance Symposium by Intel

January 2011 - (Free Research)
As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future. 
(WEBCAST) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix Systems, Inc. (E-mail this company)

June 2014 - (Free Research)
Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions – and the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Payment Card Industry Data Security Standard by Prism Microsystems Inc.

June 2008 - (Free Research)
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues. 
(WHITE PAPER) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

March 2011 - (Free Research)
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Seven for 7: Best Practices For Implementing Windows 7 by Sophos, Inc.

March 2011 - (Free Research)
In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there’s no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it’s the perfect opportunity to assess your... 
(WHITE PAPER) READ ABSTRACT |

Complying with Payment Card Industry Data Security Standards Using SEA System I Solutions by Software Engineering of America, Inc.

February 2008 - (Free Research)
This document highlights how Software Engineering of America's solution for the System i help to ensure PCI Compliance. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Hosted Email Security by Trend Micro

April 2010 - (Free Research)
Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version. 
(PRODUCT DEMO)

Trend Micro Hosted Email Security by Trend Micro

April 2010 - (Free Research)
Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version. 
(PRODUCT DEMO)

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhancing Server Platform Security with VMware by Intel

April 2011 - (Free Research)
Intel® Cloud Builders built a cloud with the use of a technology preview version of VMware vCenter Server, VMware vSphere Hypervisor, Intel Xeon processor 5600 series based server platforms and a plug in designed to interface with Intel Trusted Execution technology to provide platform attestration in the cloud. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Data Loss Prevention Solution by Websense, Inc.

January 2011 - (Free Research)
Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today. 
(WHITE PAPER) READ ABSTRACT |

5 Mistakes Auditing Virtual Environments (You Don't Want to Make) by HyTrust

July 2011 - (Free Research)
Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts