Federal Security ComputingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Federal Security Computing returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Security
 •   Storage Management
 •   Security Policies
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Data Center Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)

Related Searches
 •   Code Federal Security
 •   Content Federal Security Computing
 •   Delivery Federal Security
 •   Federal Contract
 •   Federal Implementing
 •   Federal Security Conference
 •   Federal Security Designer
 •   Federal Security Facts
 •   Technologies Federal Security
 •   White Papers Federal Security Computing
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

The Federal Mandate for Data Center Consolidation by NetApp

February 01, 2012 - (Free Research)
Learn about federal data center consolidation requirements and consolidation and cloud computing solutions designed to streamline IT infrastructure and deliver cost, energy and performance benefits. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Shared Infrastructure Data Storage in the Federal Government by NetApp

December 01, 2011 - (Free Research)
Check out this white paper to learn how to establish the most effective shared infrastructure data storage environment. Explore new best practices and how they can dramatically improve the cost, flexibility and environmental impact of an overall cloud architecture. 
(WHITE PAPER) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

IBM Point of View: Security and Cloud Computing by IBM

January 10, 2011 - (Free Research)
Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Solving Security Challenges for Government Cloud-Based IT Environments by Red Hat

December 30, 2011 - (Free Research)
Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud by IBM

August 17, 2010 - (Free Research)
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more. 
(TECHNICAL ARTICLE)

The reality behind the hype: Government cloud computing by ComputerWeekly.com

November 23, 2011 - (Free Research)
This article from Gartner offers advice to public sector organisations thinking of deploying cloud computing and assess the progress made by governments in their use of the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Technical Requirements for Mobile Health Care Deployments by Juniper Networks, Inc.

May 09, 2011 - (Free Research)
With the rapid adoption of mobile devices, it’s only natural that these devices have made their way into health care facilities. However, it’s crucial that mobile devices are protected from security vulnerabilities to ensure compliance with federal regulations. This e-guide discusses best practices for mobile health care deployments. 
(EGUIDE) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 27, 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

E-Guide: What is Health Data Archiving? by Dell, Inc.

May 04, 2011 - (Free Research)
Due to the federal Health Information Portability and Accountability Act (HIPAA), health care facilities are required to save enormous amounts of patient data every year. As a result, data archiving should be a key part of every facility’s IT plan. Access this eguide for a guide to selecting the right archiving approach to meet your storage needs. 
(EGUIDE) READ ABSTRACT |

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by Bit9, Inc.

June 09, 2009 - (Free Research)
Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment. 
(WHITE PAPER) READ ABSTRACT |

FAQ: What is Health Data Archiving? by HP & Intel®

February 26, 2013 - (Free Research)
Due to the federal Health Information Portability and Accountability Act (HIPAA), health care facilities are required to save enormous amounts of patient data every year. As a result, data archiving should be a key part of every facility's IT plan. Access this eguide for a guide to selecting the right archiving approach to meet your storage needs. 
(EGUIDE) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

The Children's Internet Protection Act by NETGEAR Inc.

December 17, 2010 - (Free Research)
Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 07, 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 12, 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 07, 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Cost Take-out: The New Top Priority for U.S. Government CFOs by IBM

December 05, 2011 - (Free Research)
The goal of this white paper is to serve as a platform from which to explore a range of possibilities and opportunities available to government CFOs in their quest to operate in a more efficient and effective manner by not only presenting a case for change, but also providing a road map for it. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Cloud-Based Recovery by SunGard Availability Services

January 20, 2012 - (Free Research)
Explore cloud-based Recovery as a Service (RaaS) in this webcast. Discover how Acacia Federal Savings Bank leveraged SunGard’s Recover2Cloud service to gain enhanced data protection, increased savings and lower risk. Watch this webcast for a walk-through of the full range of capabilities offered by SunGard’s Recover2Cloud service. 
(WEBCAST) READ ABSTRACT |

Health Care Virtualization Strategies by SearchHealthIT.com

October 19, 2012 - (Free Research)
Federal mandates for HIT adoption require health care organizations to rethink their IT infrastructure. Virtualization technologies offer many efficiencies, in both operations and management. Attend this Virtual Seminar to identify strategies for realizing the many benefits of consolidation (and overcoming common challenges). 
(VIRTUAL SEMINAR) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

February 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

Federal SOA Institute by IBM Line of Business

February 2008 - (Free Research)
The Federal SOA Institute's mission is to help the federal government adopt and benefit from service oriented architecture (SOA) by providing a robust education environment. 
(CASE STUDY)

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts