Federal Information Security DemosWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Federal Information Security Demos returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Security Monitoring
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Storage Security
 •   Application Security
 •   Endpoint Security

Related Searches
 •   Coding Federal Information Security
 •   Devices Federal Information
 •   Federal Configuration
 •   Federal Flow
 •   Federal Information Administration
 •   Federal Information Security Layer
 •   Federal Information Security Networks
 •   Federal Information Security Reports
 •   Procedure Federal Information Security
 •   Roi Federal Information Security
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

U.S. Army Relies on Globalscape® to Protect Critical Data by GlobalScape

December 31, 2013 - (Free Research)
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS). 
(CASE STUDY) READ ABSTRACT |

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 10, 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 11, 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance by Silver Tail Systems

February 22, 2011 - (Free Research)
This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks. 
(EGUIDE) READ ABSTRACT |

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation by Tripwire, Inc.

August 03, 2010 - (Free Research)
Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 18, 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise by Tripwire, Inc.

February 24, 2011 - (Free Research)
Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure. 
(DATA SHEET) READ ABSTRACT |

Applying the Four Standards of Security-Based CIA by Global Knowledge

October 28, 2013 - (Free Research)
High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

August 2009 - (Free Research)
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Cloud-Based Recovery by SunGard Availability Services

January 2012 - (Free Research)
Explore cloud-based Recovery as a Service (RaaS) in this webcast. Discover how Acacia Federal Savings Bank leveraged SunGard’s Recover2Cloud service to gain enhanced data protection, increased savings and lower risk. Watch this webcast for a walk-through of the full range of capabilities offered by SunGard’s Recover2Cloud service. 
(WEBCAST) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness by IBM

January 2014 - (Free Research)
This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Getting Started With Email Archiving for Exchange - The Exchange 2010 Edition by Sherpa Software

March 2011 - (Free Research)
This white paper discusses the reasons email archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do! by Global Knowledge

July 2013 - (Free Research)
Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts