Excel Security ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Excel Security Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Security Policies
 •   Managed Security Services
 •   Endpoint Security
 •   Security Monitoring
 •   Application Security
 •   Wireless Security
 •   Virtualization
 •   Network Management

Related Searches
 •   Diagrams Excel Security
 •   Excel Scheduling
 •   Excel Security Architecture Implement
 •   Excel Security Architecture Kentucky
 •   Excel Security Integration
 •   Manufacturers Excel
 •   National Excel Security
 •   Size Excel
 •   Utility Excel
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Enterprise Security Architecture by ComputerWeekly.com

March 01, 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 01, 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

Security Gateway Buyer's Guide by Intel

February 14, 2011 - (Free Research)
If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity. 
(WHITE PAPER) READ ABSTRACT |

Security the future: Keeping up with the business by ComputerWeekly.com

March 01, 2013 - (Free Research)
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 11, 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Windows 2003/2000/XP Security Architecture Overview by Global Knowledge Network, Inc.

June 2005 - (Free Research)
Windows 2003 Server, its workstation cousin Windows XP, and its predecessor, Windows 2000, all bring substantial advances in both reliability and security compared to Windows NT 4.0. This briefing lays out the main security features of the Windows 2003 operating system family, and put them together into a "big picture" context. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Executive Roundtable - Optimizing Your Security Architecture by McAfee, Inc.

October 2009 - (Free Research)
In this executive roundtable discussion, Representatives from McAfee, Qualcomm, and HP discuss what keeps security pros up at night. New sophisticated attacks in the threat landscape are changing security needs. Read this presentation transcript to learn more about an integrated approach to handling these new needs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Jericho Forum - the vision by ComputerWeekly.com

November 2010 - (Free Research)
Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation. 
(WHITE PAPER) READ ABSTRACT |

Rethinking Information Security to Improve Business Agility by Intel

March 2011 - (Free Research)
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Gunner Peterson's Security Gateway Buyer’s Guide by Intel

March 2011 - (Free Research)
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations. 
(WHITE PAPER) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

CW+: Overview of the Open Group Security Forum by ComputerWeekly.com

October 2010 - (Free Research)
The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. 
(WHITE PAPER) READ ABSTRACT |

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection by SearchSecurity.com

September 2013 - (Free Research)
This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks. 
(EGUIDE) READ ABSTRACT |

Overcoming virtualization security risks: Best practices by Kaspersky Lab

April 2012 - (Free Research)
Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks. 
(EGUIDE) READ ABSTRACT |

Next-Generation IPS for Dummies by Sourcefire

January 2013 - (Free Research)
Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements by Dell and Microsoft

November 2010 - (Free Research)
This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements by Dell and Microsoft

May 2010 - (Free Research)
This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth by Cisco Systems, Inc.

May 2008 - (Free Research)
In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

Cisco Smart Business Architecture by Cisco (E-mail this company)

February 2013 - (Free Research)
This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts