Federal Information Security ProfileWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Federal Information Security Profile returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Network Security
 •   Identity Management/ User Provisioning
 •   Storage Security
 •   Enterprise Information Integration/ Metadata Management
 •   Vulnerability Assessment

Related Searches
 •   Check Federal Information Security
 •   Federal Information Communication
 •   Federal Information Price
 •   Federal Information Security Pos
 •   Federal Information Security Reviews
 •   Federal Managing
 •   Federal Network
 •   Federal Technical
 •   Paper Federal Information
 •   Test Federal Information
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance by Silver Tail Systems

February 22, 2011 - (Free Research)
This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks. 
(EGUIDE) READ ABSTRACT |

U.S. Army Relies on Globalscape® to Protect Critical Data by GlobalScape

December 31, 2013 - (Free Research)
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS). 
(CASE STUDY) READ ABSTRACT |

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 10, 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 11, 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation by Tripwire, Inc.

August 03, 2010 - (Free Research)
Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Getting Started With Email Archiving for Exchange - The Exchange 2010 Edition by Sherpa Software

March 30, 2011 - (Free Research)
This white paper discusses the reasons email archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company. 
(WHITE PAPER) READ ABSTRACT |

Getting Started With E-mail Archiving for Exchange by Sherpa Software

May 01, 2008 - (Free Research)
This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company. 
(WHITE PAPER) READ ABSTRACT |

5 Ways to Ensure Information Management Compliance by Iron Mountain

March 13, 2012 - (Free Research)
Use this resource as a guide to to make sure your information is maintaining compliance with regulations and standards. Find five tips to help lower your risk profile and boost your audit readiness. 
(DATA SHEET) READ ABSTRACT |

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance by DataFlux Corporation

January 14, 2009 - (Free Research)
Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations. 
(CASE STUDY) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

De-risking IT Lifecycle Management by ComputerWeekly.com

November 23, 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 12, 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 12, 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness by IBM

January 31, 2014 - (Free Research)
This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile by Hewlett-Packard Company

November 2008 - (Free Research)
This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

February 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies by Embarcadero Technologies, Inc.

March 2009 - (Free Research)
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Reporting by SAP

November 2009 - (Free Research)
This paper explores the reporting challenges faced by organizations and examines the many benefits of automated U.S. American Recovery and Reinvestment Act (ARRA) reporting systems. 
(WHITE PAPER) READ ABSTRACT |

E-Book: IT in the Electronic Hospital by Imprivata

February 2010 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts