Federal Security Manager BusinessesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Federal Security Manager Businesses returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Network Security
 •   Storage Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Storage Management
 •   Treasury / Cash / Risk Management
 •   Fraud Detection & Prevention

Related Searches
 •   Configurations Federal
 •   Cycles Federal Security Manager
 •   Design Federal Security
 •   Device Federal
 •   Federal Employee
 •   Federal Rfi
 •   Federal Security Manager Summary
 •   Federal Security National
 •   Repair Federal
 •   Search Federal Security Manager
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 07, 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

IT Download - Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

February 25, 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

5 Backup Features to Ensure Compliance by APTARE

June 28, 2013 - (Free Research)
In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information. 
(WHITE PAPER) READ ABSTRACT |

Quantum Encryption Solutions by Quantum Corporation

July 07, 1967 - (Free Research)
Quantum Encryption Key Manager (Q-EKM) is an easy-to-use solution for protecting valuable data at rest across the enterprise. 
(VIDEOCAST) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies by Embarcadero Technologies, Inc.

March 27, 2009 - (Free Research)
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies. 
(WHITE PAPER) READ ABSTRACT |

The Federal Mandate for Data Center Consolidation by NetApp

February 01, 2012 - (Free Research)
Learn about federal data center consolidation requirements and consolidation and cloud computing solutions designed to streamline IT infrastructure and deliver cost, energy and performance benefits. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Essentials for Privileged Account Management by FoxT

February 01, 2010 - (Free Research)
In this white paper, discover how you can effectively and efficiently control privileged accounts using the latest in adaptive access controls management. You will also learn about how to leverage the latest in Role-Based Access Controls. 
(WHITE PAPER) READ ABSTRACT |

American Recovery and Reinvestment Act: How the Pioneers Plan to meet Reporting and Compliance Mandates by SAP

November 19, 2009 - (Free Research)
The ARRA was enacted to jumpstart the US economy and drive it out of the recession. One of the requirements of the recovery act is that organizations that receive funds for projects must report on the outcomes of those projects. Read on to learn what these executives and managers plan to do to meet the reporting and compliance mandates. 
(ANALYST REPORT) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 13, 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

The Six Critical Skills for Leading Complex Federal Projects by Global Knowledge

March 19, 2014 - (Free Research)
Managing a project within a government entity can be difficult with the sheer magnitude of the red tape involved. There are, however, several steps that you can take as a project manager to get ahead of the curve and anticipate previously unforeseen risks and issues with your project team. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Shared Infrastructure Data Storage in the Federal Government by NetApp

December 01, 2011 - (Free Research)
Check out this white paper to learn how to establish the most effective shared infrastructure data storage environment. Explore new best practices and how they can dramatically improve the cost, flexibility and environmental impact of an overall cloud architecture. 
(WHITE PAPER) READ ABSTRACT |

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 12, 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Reporting by SAP

November 19, 2009 - (Free Research)
This paper explores the reporting challenges faced by organizations and examines the many benefits of automated U.S. American Recovery and Reinvestment Act (ARRA) reporting systems. 
(WHITE PAPER) READ ABSTRACT |

Overcoming challenges of asset management amid declining federal budgets by IBM

April 27, 2012 - (Free Research)
This paper details an asset management solution from IBM. This option is designed for the federal government and enables seamless integration and support maintenance of every asset across the enterprise. Read this now and learn how this option can offer complete visibility into every asset, enable elevated risk management and more. 
(WHITE PAPER) READ ABSTRACT |

Federal SOA Institute by IBM Line of Business

February 2008 - (Free Research)
The Federal SOA Institute's mission is to help the federal government adopt and benefit from service oriented architecture (SOA) by providing a robust education environment. 
(CASE STUDY)

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Comparing health care data security compliance to other industries by Hewlett-Packard Company

April 2012 - (Free Research)
<p>This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.</p> 
(EGUIDE) READ ABSTRACT |

Getting Started With Email Archiving for Exchange - The Exchange 2010 Edition by Sherpa Software

March 2011 - (Free Research)
This white paper discusses the reasons email archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company. 
(WHITE PAPER) READ ABSTRACT |

IT in the Electronic Hospital by SearchHealthIT.com

August 2009 - (Free Research)
The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives. 
(EGUIDE) READ ABSTRACT |

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness by IBM

January 2014 - (Free Research)
This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts