Examples Security Operations BuildingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Examples Security Operations Building returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Application Security
 •   Business Intelligence Solutions
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Enterprise Information Integration/ Metadata Management
 •   Data Center Management
 •   Managed Security Services

Related Searches
 •   B2C Examples Security
 •   Examples Contract
 •   Examples Security Features
 •   Examples Security Operations Database
 •   Examples Security Operations Procedures
 •   Examples Security Operations Procurement
 •   Examples Security Size
 •   Export Examples
 •   Linux Based Examples Security Operations
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Building a Successful Security Operations Center by ArcSight, an HP Company

December 01, 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

Building An Intelligence - Driven Security Operations Center by EMC Corporation

February 28, 2013 - (Free Research)
Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security. 
(WHITE PAPER) READ ABSTRACT |

How to Implement a Data Loss Prevention Strategy by Sophos, Inc.

April 23, 2010 - (Free Research)
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by looking at what’s driving data loss prevention, the consequences of data loss, and a possible solution. It then moves on to practical implementation advice and examples. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 11, 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Data Protection 2.0: It’s Not Just Names and Numbers Anymore by Tripwire, Inc.

February 08, 2011 - (Free Research)
The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges. 
(WHITE PAPER) READ ABSTRACT |

6 Steps to Prevent a Data Breach by Symantec Corporation

September 03, 2009 - (Free Research)
Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches. 
(BROCHURE) READ ABSTRACT |

Building Data Quality Efforts Into Everyday Processes by DataFlux Corporation

July 06, 2012 - (Free Research)
Poor data quality at the most minor level can have major ramifications. Read this expert e-book to gain advice on how to make data quality a high priority in your day-to-day business operations. Discover tips on implementing internal data quality standards and how to train users on data quality best practices. 
(EBOOK) READ ABSTRACT |

Transform insights into action IBM’s: Watson and the future of data by IBM

June 06, 2011 - (Free Research)
Traditional computing systems are built to analyze only structured data, or to run analytics in batch reporting jobs. Explore how Watson is an example of the new kind of workloads that businesses will apply to achieve their business goals. 
(WHITE PAPER) READ ABSTRACT |

Debunking the Myth of the Single-Vendor Network by Juniper Networks, Inc.

December 06, 2010 - (Free Research)
Read this analyst report to see why most organizations should consider a dual-vendor or multivendor solution as a viable approach to building their network.  Not only are significant cost savings achievable with no increase in network complexity, but there is also an improvement in focus on meeting business requirements. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript of APM Best Practices: Real-World Examples of Successful APM Strategies by Hewlett-Packard Company

August 20, 2010 - (Free Research)
This presentation transcript explains how organizations can reduce service disruptions and improve IT management through application and performance monitoring. Discover tools that can be leveraged to lower infrastructure costs while delivering other business benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 02, 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

The ABCs of Adopting DevOps by IBM

May 31, 2013 - (Free Research)
View this white paper to learn how a DevOps strategy can eliminate bottlenecks that occur during the handoff between development and operations while reducing time to customer feedback, improving governance, and balancing quality and cost. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Predictive Analytics: The Next Big Thing in BI? by IBM

December 03, 2010 - (Free Research)
In this e-book, learn about predictive analytics technology and why it’s getting increased attention from prospective users. Read about real-world predictive analytics projects and get expert advice on organizing a predictive analytics program and on developing and utilizing predictive models in business operations and more. 
(EBOOK) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007 by F5 Networks

November 2007 - (Free Research)
One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution. 
(WHITE PAPER) READ ABSTRACT |

The ABCs of continuous release and deploy in a DevOps approach by IBM

May 2013 - (Free Research)
In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process. 
(WHITE PAPER) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

VMware vCloud Implementation Example by VMware, Inc.

July 2013 - (Free Research)
This reference guide provides an implementation example for deploying a private cloud in your VMware environment. Download now for a definition of vCloud and details about the architectural components and requirements for initial implementation. 
(WHITE PAPER) READ ABSTRACT |

Tiered Storage Takes Center Stage (Horison) by Oracle Corporation

December 2010 - (Free Research)
This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage. 
(WHITE PAPER) READ ABSTRACT |

Digital Trust in the Cloud: Liquid Security in Cloudy Places by CSC

November 2011 - (Free Research)
While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue. 
(WHITE PAPER) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Optimizing BI and Analytics in Healthcare by Tableau Software

May 2010 - (Free Research)
BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare. 
(EBOOK) READ ABSTRACT |

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts