Front Door Security StrategyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Front Door Security Strategy returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Mobile Device Management
 •   Security Policies
 •   Storage Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Application Security

Related Searches
 •   Databases Front Door Security
 •   Front Buy
 •   Front Door Files
 •   Front Door Recovery
 •   Front Door Security Developments
 •   Front Door Security Own
 •   Front Door Security Solution
 •   Front On-Line
 •   Functions Front Door Security
 •   Production Front Door Security
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Intelligent Customer Front Door: Rolling Out the Red Carpet for Increased Customer Satisfaction by Genesys

March 27, 2008 - (Free Research)
Download the new business paper, The intelligent Customer Front Door: Rolling Out the Red Carpet for Increased Customer Satisfaction and discover how your contact center can actually anticipate customers' needs and allow them to control the interaction. 
(WHITE PAPER) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 10, 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

The Intelligent Customer Front Door: Go Beyond the Limitations of Traditional Interactive Voice Response (IVR) to Deliver Superior Customer Service by Genesys

June 2008 - (Free Research)
This white paper discusses how companies can transform customer service by applying intelligent business rules for optimal efficiency and a competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Managing Data in the Hospital by BridgeHead Software

December 2013 - (Free Research)
Access this expert e-guide to learn about the critical need for the healthcare industry to develop effective data management strategies not only to get up to speed with the health reform and meaningful use program, but also improve operational efficiencies to strengthen quality patient care. 
(EGUIDE) READ ABSTRACT |

Cloud Security Designed for Amazon Web Services (AWS) by Trend Micro

May 2014 - (Free Research)
This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud. 
(WHITE PAPER) READ ABSTRACT |

Protecting the Dynamic Datacenter by Trend Micro

August 2009 - (Free Research)
Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

It's All About Security: Things to Know Before You Open The Doors To Smartphones and Tablets in Your Enterprise by Sybase, an SAP company

June 2011 - (Free Research)
This white paper discusses mobile device security threats and how IT can manage and secure devices. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to protect end users, their devices, and the network infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Beyond the Breach by FireEye

June 2014 - (Free Research)
This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable. 
(WHITE PAPER) READ ABSTRACT |

ISM Essentials Guide – Threat Management by SearchSecurity.com

December 2012 - (Free Research)
In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Rethinking MDM in a BYOD World by SearchSecurity.com

November 2012 - (Free Research)
Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected. 
(WHITE PAPER) READ ABSTRACT |

Building Your Backup and Disaster Recovery Plan 101 by StorageCraft Technology Corporation

June 2011 - (Free Research)
Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan. 
(WHITE PAPER) READ ABSTRACT |

Security Think Tank: Bring your own device by ComputerWeekly.com

June 2013 - (Free Research)
With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Requirements-Driven Product Development by IBM

May 2009 - (Free Research)
This document discusses the challenges in implementing DOORS in a rapidly evolving environment and the clear payoffs from using DOORS to integrate across diverse disciplines and to boost the collaborative effort. 
(WHITE PAPER) READ ABSTRACT |

February Essentials Guide on Threat Management by SearchSecurity.com

February 2012 - (Free Research)
Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Cloud: Time for Delivery by ComputerWeekly.com

February 2012 - (Free Research)
This report from Capgemini, shows how organisations can navigate around ‘cloud confusion’  from suppliers pushing products rather than business solutions. 
(ESSENTIAL GUIDE) READ ABSTRACT |

A More Secure From Door: SSO and Strong Authentication by Imprivata

February 2014 - (Free Research)
This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs. 
(WHITE PAPER) READ ABSTRACT |

Leveraging the Value Proposition of SOA: How Enterprise Architecture Helps Organizations Analyze and Develop Their Services Strategy by Telelogic, An IBM Company

May 2007 - (Free Research)
This paper discusses SOA as more than a technology. SOA is an architectural principle that opens the door to using IT technology in new ways to help improve efficiency and productivity and provide value to both providers and consumers of services. 
(WHITE PAPER) READ ABSTRACT |

CIO insights: Moving from the back office to the front line by ComputerWeekly.com

December 2013 - (Free Research)
This major global C-level survey from IBM examines the changing role of the CIO and makes recommendations for CIOs who want to move from the back office to the front line of the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Closing the Back Door on Network Application Vulnerabilities by Sophos, Inc.

July 2012 - (Free Research)
This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers. 
(WHITE PAPER) READ ABSTRACT |

Shutting the Door on Data Theft by Websense, Inc.

September 2011 - (Free Research)
Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you. 
(WEBCAST) READ ABSTRACT |

Greenbrier Turns to DocAve® for SharePoint® Data Protection by AvePoint, Inc.

February 2010 - (Free Research)
Greenbrier needed a fast, stable, and scalable SharePoint data protection solution capable of backing up directly to disk, and able to seamlessly integrate with both their existing and intended IT infrastructure. Learn why they turned to AvePoint's DocAve solution for its reliability and modular architecture. 
(CASE STUDY) READ ABSTRACT |

Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives by SearchExchange.com

April 2009 - (Free Research)
In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions. 
(EZINE)

Disk-Based Backup & Recovery by Datalink Corp

January 2008 - (Free Research)
Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are. 
(WEBCAST)

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems by Hewlett-Packard Limited

November 2013 - (Free Research)
Prevent future cyber attacks from occurring by modifying your company's security infrastructure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts