How Security DevelopmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: How Security Development returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Application Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Endpoint Security
 •   Managed Security Services
 •   Virtualization

Related Searches
 •   Access How
 •   Benefits How Security
 •   Call How Security Development
 •   How Creation
 •   How Security Analysis
 •   How Security Cycles
 •   How Security Development Service
 •   How Texas
 •   Requirements How Security
 •   Site How Security
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: How Security is Well Suited for Agile Development by IBM

June 21, 2011 - (Free Research)
View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webcast: How Security is well suited for Agile development by IBM

June 15, 2011 - (Free Research)
View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

Podcast: How Security is well suited for Agile development by IBM

June 07, 2011 - (Free Research)
Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle. 
(PODCAST) READ ABSTRACT |

Safe & Secure: An Overview of Security Features In JBoss Application Platforms by Red Hat

July 08, 2010 - (Free Research)
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle. 
(WEBCAST) READ ABSTRACT |

How to Overcome Security Skills Deficiencies by IBM

May 31, 2013 - (Free Research)
This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.

June 29, 2011 - (Free Research)
This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing. 
(WHITE PAPER) READ ABSTRACT |

How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.

February 17, 2011 - (Free Research)
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data. 
(WHITE PAPER) READ ABSTRACT |

Debunking Security Concerns with Hosted Call Centers by inContact

January 10, 2011 - (Free Research)
This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

White Paper: SCM: The "Blocking and Tackling" of IT Security by Tripwire, Inc.

November 10, 2011 - (Free Research)
In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Location Evaluation Factors for Offshore Outsourcing: The Promise and the Peril by Accenture

March 17, 2009 - (Free Research)
When it comes to offshore outsourcing, security and location decisions have become more important overtime. Read this presentation transcript from the webcast of the same name and discover best practices and security risks in offshore outsourcing. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IT Executive Guide to Security Intelligence by IBM

February 24, 2011 - (Free Research)
In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security. 
(WHITE PAPER) READ ABSTRACT |

Transitioning from Log Management and SIEM to Security Intelligence by IBM

January 01, 2013 - (Free Research)
Learn how security intelligence empowers organizations to maintain comprehensive and cost-effective threat prevention and risk aversion. 
(WHITE PAPER) READ ABSTRACT |

Avoiding Insider Threats to Enterprise Security by IBM

October 31, 2012 - (Free Research)
This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver by Security Weaver

November 08, 2010 - (Free Research)
In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit. 
(CASE STUDY) READ ABSTRACT |

What Security Threats Can We Expect in 2012? by Websense, Inc.

December 15, 2011 - (Free Research)
View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 19, 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Balancing Risk with Agility: Best Practices for Securing Public Cloud Deployments by Trend Micro

May 30, 2014 - (Free Research)
This exclusive webcast will give you key advice for ensuring the security of your data and applications in the cloud. 
(PODCAST) READ ABSTRACT |

TechTarget ANZ Securing Virtualised Data Centres E-Book by Trend Micro

August 04, 2010 - (Free Research)
Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them. 
(EBOOK) READ ABSTRACT |

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2 by IBM

September 20, 2011 - (Free Research)
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization. 
(EGUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program by IBM

August 25, 2011 - (Free Research)
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization. 
(EGUIDE) READ ABSTRACT |

Securing a Dynamic Infrastructure by IBM

June 12, 2009 - (Free Research)
This white paper describes how security that is built into a dynamic infrastructure can mitigate risks, enabling agility, secure collaboration, and business transformation. The IBM Security Framework and lifecycle approach can help address changing business requirements. 
(WHITE PAPER) READ ABSTRACT |

Internet Security Census 2013 by Fortinet, Inc.

December 31, 2013 - (Free Research)
This guide explores key survey findings regarding increased workplace mobility and how security threats are targeted toward various mobile endpoints. 
(WHITE PAPER) READ ABSTRACT |

Identity-Centric Security: Enabling and Protecting the Business by CA Technologies.

May 31, 2013 - (Free Research)
Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Striving for Better Information Security Intelligence by Tripwire, Inc.

September 15, 2011 - (Free Research)
The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments. 
(EGUIDE) READ ABSTRACT |

eBook: Encryption 360 Degrees by TechTarget

May 20, 2009 - (Free Research)
Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today. 
(EBOOK) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts