Electronic Security PublicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Electronic Security Public returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Email Archiving
 •   Records Management
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Application Security
 •   Storage Management

Related Searches
 •   Budget Electronic Security Public
 •   E-Commerce Electronic Security
 •   Electronic Manager
 •   Electronic Operating
 •   Electronic Security Measure
 •   Electronic Security Public Summary
 •   Electronic Security Solution Software
 •   Implementations Of Electronic
 •   Maintenance Electronic Security Public
 •   Timeline Electronic
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Automation Suite for NERC CIP Compliance by LogRhythm, Inc.

March 29, 2013 - (Free Research)
Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more. 
(WHITE PAPER) READ ABSTRACT |

EMC Documentum Information Rights Management by EMC Corporation

December 2006 - (Free Research)
This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients. 
(WHITE PAPER) READ ABSTRACT |

HP Cloud Service Automation by HP & Intel®

September 2011 - (Free Research)
In this white paper learn why HP Cloud Service Automation is uniquely positioned to help your company get ahead in a business landscape increasingly dominated by cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Security in the Cloud - Solutions Brief by Intel

February 2012 - (Free Research)
This solution brief poses key questions concerning cloud security and explores new tools you can leverage to ensure the privacy of data at rest and in motion, provide verification of compliance, and more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information by Iron Mountain

December 2013 - (Free Research)
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices. 
(WHITE PAPER) READ ABSTRACT |

E-Book: The Business Case for Cloud Computing in Today's Health Care Industry by NetApp

June 2012 - (Free Research)
This E-Book from SearchHealthIT.com highlights some of the most important considerations for integrating public and private cloud structures into your health care facility. Within, learn about the cloud's risks and rewards, how to prepare for public cloud services, setting up your own private cloud, and much more. 
(EBOOK) READ ABSTRACT |

Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices by SearchSecurity.com

July 2011 - (Free Research)
This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

CW+: Quocirca report: Effective public sector citizen communication by ComputerWeekly.com

August 2010 - (Free Research)
The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change. 
(WHITE PAPER) READ ABSTRACT |

2006 Global Information Security Workforce Study by ISC2

October 2006 - (Free Research)
Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required. 
(WHITE PAPER) READ ABSTRACT |

The future of Government operations: Digital citizen survey by ComputerWeekly.com

May 2012 - (Free Research)
This report from Accenture looks at the challenges facing the public sector in offering digital services. 
(IT BRIEFING) READ ABSTRACT |

Support Global Expansion with Trade and Financial Compliance by SAP America, Inc.

November 2009 - (Free Research)
The SAP BusinessObjects Electronic Invoicing for Brazil (SAP BusinessObjects Nota Fiscal Eletronica) application helps companies that do business in Brazil meet digital invoice regulations. The application enables automated, certified, and secure communication with government systems at the state and federal level. 
(ANALYST BRIEF) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Prince George’s County School District Streamlines Email Investigations and Boosts IT Productivity with Google Apps and Google Message Discovery by Google Postini

December 2009 - (Free Research)
In March 2008, Prince George's County Public Schools ran a pilot of Google Apps Education Edition. In this case study, you'll learn how they used it to dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly 2 August 2011: We examine the calls for radical reform in the relationship between Whitehall and its IT suppliers by ComputerWeekly.com

August 2011 - (Free Research)
With the release of a scathing report on government IT, we examine calls for radical reform in the relationship between Whitehall and its IT suppliers. Also this week, the first part of our Buyer’s Guide to Big Data, and a case study on how Carphone Warehouse improved customer satisfaction by 38% using business process management (BPM) software. 
(EZINE) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 27 November 2012: Announcing the most influential people in UK IT by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now. 
(EZINE) READ ABSTRACT |

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by SearchSecurity.com

December 2012 - (Free Research)
This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more. 
(EGUIDE) READ ABSTRACT |

Ecomanage Network Corporation Develops a Service Offering for Manufacturers to Fully Manage Wastes and Meet Disposal Regulations by IBM

October 2009 - (Free Research)
Read this case study to see how IBM Global Services implemented and is operating the Wastes and Resources Circulation Management System, a hybrid solution of private and public cloud computing. 
(CASE STUDY) READ ABSTRACT |

Reducing the Cost of Electronic Gaming Machine Support with Intel® vPro™ Technology by Wipro Technologies

February 2009 - (Free Research)
This paper illustrates the expected cost savings of deploying this technology to support electronic gaming operations. 
(ARTICLE) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Public Cloud Security Tips and Best Practices by SearchBusinessAnalytics

February 2013 - (Free Research)
This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more. 
(EGUIDE) READ ABSTRACT |

Fighting fraud in government by ComputerWeekly.com

January 2012 - (Free Research)
Public sector organisations are experiencing increasing levels of economic crime, including cybercrime, and are particularly at risk from being defrauded by their own employees and their suppliers, according to findings from PwC’s latest Global Economic Crime Survey. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution by Citrix Online - GotoMyPC

January 2004 - (Free Research)
Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts