Federal Consultancy SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Federal Consultancy Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Network Security
 •   Storage Management
 •   Storage Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Data Center Management
 •   Virtualization

Related Searches
 •   Benefits Of Federal Consultancy Security
 •   Calls Federal Consultancy
 •   Events Federal Consultancy Security
 •   Federal Consultancy Decision
 •   Federal Consultancy Methodology
 •   Federal Consultancy Oregon
 •   Federal Consultancy Version
 •   Federal Framework
 •   Maintain Federal
 •   Trends Federal Consultancy
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on Cognizant by ComputerWeekly.com

February 21, 2013 - (Free Research)
This 7 page special report from Computer Weekly gives you the facts on Cognizant, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW Special Report on TCS by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Tape Robotics Today by Iron Mountain

August 30, 2012 - (Free Research)
In this recording, Ben Woo, managing director of storage consultancy at Neuralytix, discusses recent developments in the area of tape library robotics. 
(PODCAST) READ ABSTRACT |

The Federal Mandate for Data Center Consolidation by NetApp

February 01, 2012 - (Free Research)
Learn about federal data center consolidation requirements and consolidation and cloud computing solutions designed to streamline IT infrastructure and deliver cost, energy and performance benefits. 
(WHITE PAPER) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 20, 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Shared Infrastructure Data Storage in the Federal Government by NetApp

December 01, 2011 - (Free Research)
Check out this white paper to learn how to establish the most effective shared infrastructure data storage environment. Explore new best practices and how they can dramatically improve the cost, flexibility and environmental impact of an overall cloud architecture. 
(WHITE PAPER) READ ABSTRACT |

A clearer horizon. Do CIOs have more clarity about cloud computing? by ComputerWeekly.com

December 01, 2011 - (Free Research)
This research from management consultants, Xantus, shows that while there is still a lack of clarity and a reluctance to fully commit to the cloud, there is a general acceptance from CIOs of the benefits and a growing commitment to develop those benefits. 
(IT BRIEFING) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

The Children's Internet Protection Act by NETGEAR Inc.

December 17, 2010 - (Free Research)
Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 07, 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 12, 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 07, 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Bank Reduces Management Time and Avoids External Consultancy Costs with Dell Fluid Data Technology by Dell Compellent

September 09, 2011 - (Free Research)
Bankadati wanted to support rapid business growth by installing a more agile, manageable data storage platform that would help avoid unnecessary downtime. Read this white paper to learn how they successfully implemented Fluid Data technology. 
(WHITE PAPER) READ ABSTRACT |

Special Report on Infosys by ComputerWeekly.com

July 26, 2012 - (Free Research)
This 6 page special report from Computer Weekly gives you the key facts on Infosys, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Your Strategic Partner in Demand Driven Manufacturing: Atos Origin Manufacturing Consultancy for MES and CPG by Atos Origin

January 15, 2010 - (Free Research)
In this paper you will learn how Atos Origin can help your organization to integrate your entire manufacturing operation to help you get ahead in the demand driven manufacturing game. Read on to learn more about partnering with Atos Origin to increase your competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

Data Centre Risk Index 2013 by ComputerWeekly.com

June 03, 2013 - (Free Research)
The Data Centre Risk Index 2013 evaluates risks likely to affect the successful operation of data centre facilities in the 30 most important global markets. 
(IT BRIEFING) READ ABSTRACT |

Harvey Nash CIO Survey 2012 by ComputerWeekly.com

May 14, 2012 - (Free Research)
CIOs are more confident of securing technology budget increases than at any time in the last five years, according to the CIO Technology Survey 2012. 
(IT BRIEFING) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Federal SOA Institute by IBM Line of Business

February 2008 - (Free Research)
The Federal SOA Institute's mission is to help the federal government adopt and benefit from service oriented architecture (SOA) by providing a robust education environment. 
(CASE STUDY)

Overcoming challenges of asset management amid declining federal budgets by IBM

April 2012 - (Free Research)
This paper details an asset management solution from IBM. This option is designed for the federal government and enables seamless integration and support maintenance of every asset across the enterprise. Read this now and learn how this option can offer complete visibility into every asset, enable elevated risk management and more. 
(WHITE PAPER) READ ABSTRACT |

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts