Formats ControlsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Formats Controls returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Authentication / Password Management
 •   Application Management and Maintenance
 •   Security Policies
 •   Identity Management/ User Provisioning
 •   Endpoint Security

Related Searches
 •   Balancing Formats
 •   Conferencing Formats Controls
 •   Creating Formats Controls
 •   Find Formats Controls
 •   Formats Controls Indian
 •   Formats Controls Management
 •   Formats Controls Offices
 •   Formats Controls Small
 •   Formats Rfi
 •   Record Formats
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) by Imprivata

February 28, 2014 - (Free Research)
This resource guides you through what you need to know about electronic prescriptions for controlled substances, and offers 5 questions you should ask before implementing EPCS in your facility. 
(WHITE PAPER) READ ABSTRACT |

Executive Guide to SYSPRO Security for Auditing Assurance and Control by SYSPRO

December 31, 2013 - (Free Research)
This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success. 
(WHITE PAPER) READ ABSTRACT |

Why Choice and Control are Critical to a Successful Cloud Strategy by IBM

June 13, 2012 - (Free Research)
This whitepaper covers the reasons why some are hesitant to adopt the cloud and offers four tips for an effective cloud strategy. 
(WHITE PAPER) READ ABSTRACT |

Five Pillars for Controlling Firewall ACLs and Rules by Infoblox

January 31, 2013 - (Free Research)
Read this white paper to learn how to leverage automation to shorten time to deploy, improve staff efficiency and maintain a secure network. 
(WHITE PAPER) READ ABSTRACT |

Protecting Control Networks: Key Considerations For Protection by Sourcefire

December 31, 2013 - (Free Research)
This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 06, 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

Bring Distributed Environments Under Control with Desktop Virtualization by Dell, Inc.

November 18, 2013 - (Free Research)
This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Regain Visibility and Control with Cost-effective Next-generation Security by Palo Alto Networks

August 2013 - (Free Research)
This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

Achieve Network Visibility and Control with Firewall Traffic Classification by Palo Alto Networks

March 2014 - (Free Research)
In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Superuser Access by Dell Software

December 2011 - (Free Research)
"Super users" – those people with greater access and rights – is a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Discover the risks associated with privileged accounts and how to mitigate them. Read "Controlling and Managing Super User Access" 
(WHITE PAPER) READ ABSTRACT |

HP Insight Control Server Provisioning Technology by HP and Intel

August 2013 - (Free Research)
Read through this exclusive white paper to gain insight into the value of HP's Insight Control server and its underlying technology. 
(WHITE PAPER) READ ABSTRACT |

Deliver the Web Access Your Users Want With the Control You Need by DataDirect Networks

November 2011 - (Free Research)
URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection. 
(WHITE PAPER) READ ABSTRACT |

Deliver the Web Access Your Users Want With the Control You Need by BlueCoat

November 2011 - (Free Research)
URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection. 
(WHITE PAPER) READ ABSTRACT |

When Availability Matters: Change Control for SaaS Providers by Tenzing Managed IT Services

December 2010 - (Free Research)
This paper examines that to build an effective change management framework and achieve high availability numbers for an SaaS application requires maturing IT processes along established best practices and investing in quality change management tools. 
(WHITE PAPER) READ ABSTRACT |

Meeting Today's Security Challenges with End-to-end Access Control by Juniper Networks, Inc.

March 2008 - (Free Research)
This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Top Five Network Access Control Challenges by Juniper Networks, Inc.

January 2012 - (Free Research)
Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment by Dell Software

October 2009 - (Free Research)
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs. 
(WHITE PAPER) READ ABSTRACT |

Role Based Access Control and Entitlement Management by FoxT

September 2009 - (Free Research)
The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PACs for Industrial Control, the Future of Control by National Instruments

September 2008 - (Free Research)
This white paper explores the origins of the Programmable Automation Controllers (PAC), how PACs differ from Programmable Logic Controllers (PLC) and PCs, and the future direction of industrial control with PACs. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security and Control by Sophos, Inc.

October 2008 - (Free Research)
Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints. 
(TRIAL SOFTWARE)

Kaspersky Endpoint Security 8 for Windows by Kaspersky Lab

October 2011 - (Free Research)
Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings. 
(WHITE PAPER) READ ABSTRACT |

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by Bit9, Inc.

June 2009 - (Free Research)
Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts