Global Format Building SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Global Format Building Security returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Network Security
 •   Data Security
 •   Application Security
 •   Managed Security Services
 •   Security Policies
 •   Business Process Management (BPM)
 •   Virtualization
 •   Wireless Technologies and Mobile Computing
 •   Endpoint Security

Related Searches
 •   Asp Global Format
 •   Construction Global
 •   Global Computer
 •   Global Format Building Tutorial
 •   Global Webinars
 •   Issues Global Format Building
 •   Issues With Global
 •   Product Global Format
 •   Strategy Global Format
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process by IBM

December 09, 2011 - (Free Research)
In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Improving software with the building security in maturity model by IBM

May 26, 2011 - (Free Research)
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time. 
(EGUIDE) READ ABSTRACT |

Mobile Application Security from HP - Build security into your mobile applications by Hewlett-Packard Limited

January 04, 2012 - (Free Research)
Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment. 
(WEBCAST) READ ABSTRACT |

Security in the Cloud Planning Guide by Intel

September 01, 2011 - (Free Research)
Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected. 
(WHITE PAPER)

Five critical steps to achieving an effective application security program by IBM

December 31, 2013 - (Free Research)
This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes. 
(WHITE PAPER) READ ABSTRACT |

Securing the Next-Generation Data Center by McAfee, Inc.

August 11, 2011 - (Free Research)
Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation. 
(WHITE PAPER) READ ABSTRACT |

Keeping Networks safe from Social Networking by BlueCoat

November 21, 2011 - (Free Research)
Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking. 
(EGUIDE) READ ABSTRACT |

Software Security Delivered in the Cloud by Hewlett-Packard Company

October 28, 2011 - (Free Research)
HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Managing Threat in a Digital Age by IBM

August 31, 2011 - (Free Research)
Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence." 
(WHITE PAPER) READ ABSTRACT |

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos, Inc.

December 2008 - (Free Research)
This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them. 
(WHITE PAPER) READ ABSTRACT |

IBM ISS Global Data Center content analysis technology for the Web and e-mail by IBM

November 2008 - (Free Research)
The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content. 
(WHITE PAPER) READ ABSTRACT |

Global Threats Report Dec 2011 by ESET

January 2012 - (Free Research)
The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Building a Global B2B Brand by Wipro Technologies

June 2009 - (Free Research)
In this paper you'll read about the steps Wipro Technologies took in order to take its brand name to the next level in order to compete with the top global IT companies. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Train with the Worldwide Leader in Authorized Cisco Training by Global Knowledge Network, Inc.

February 2006 - (Free Research)
Customers rely on us to deliver quality learning products and services featuring superior instruction and training. Cisco trusts Global Knowledge, the world's largest Cisco Learning Solutions Partner, to deliver expert instruction to a worldwide network of learners and to be the primary training provider for their Associate Sales Engineers. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

Ovum briefing: The cloud computing strategies of major telcos by ComputerWeekly.com

December 2010 - (Free Research)
The major global telcos have led the competitive march from telecoms into cloud computing, and are now widely seen as credible players in cloud computing services including infrastructure-as-a-service (IaaS). 
(WHITE PAPER) READ ABSTRACT |

Sustainability and the Cloud: The Global Environmental Benefits of IT Hosting and Cloud Technology by Rackspace Hosting

April 2011 - (Free Research)
Through this year-long series of whitepapers and webinars, independent analyst Ben Kepes will be building a cloud computing curriculum designed for technologists and non-technical users alike. 
(WHITE PAPER) READ ABSTRACT |

3 Reasons to Find Backup and Recovery Built for Virtualized Environments by VMware, Inc.

April 2014 - (Free Research)
This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends by ComputerWeekly.com

August 2011 - (Free Research)
In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now. 
(EZINE) READ ABSTRACT |

The IBM Rational Jazz Strategy for Collaborative Application Lifecycle Management by IBM

November 2011 - (Free Research)
This white paper discusses the vision for the Jazz initiative, the technology and associated products from Rational and its partners, and the community that is participating in all of these elements. It includes experiences shared by users of Rational Jazz products as well as those of partners building complementary Jzzz-based capabilities. 
(WHITE PAPER) READ ABSTRACT |

The Application Usage and Risk Report by Palo Alto Networks

December 2011 - (Free Research)
This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application. 
(WHITE PAPER) READ ABSTRACT |

Building Compliance and Security into an Application Delivery Framework by Citrix

April 2008 - (Free Research)
The right IT solution, such as Citrix Delivery Center™, offers a holistic approach to delivering compliance and security. 
(WHITE PAPER) READ ABSTRACT |

Solitaire: Is your platform secure? Really? by IBM

November 2013 - (Free Research)
This resource analyses three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives. 
(WHITE PAPER) READ ABSTRACT |

Profiting from PCI Compliance by IBM

September 2007 - (Free Research)
This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts