Impact Of SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Impact Of Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Managed Security Services
 •   Wireless Security
 •   Application Security
 •   Storage Security
 •   Endpoint Security

Related Searches
 •   Architecture Impact
 •   Basic Impact Of Security
 •   Display Impact Of Security
 •   Form Impact
 •   Impact Of Security Tools Software
 •   Impact Of View
 •   Impact Sheets
 •   Impact Supply
 •   Introduction Of Impact Of
 •   Top Impact Of
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

How to tackle trust management and business impact levels by ComputerWeekly.com

November 10, 2010 - (Free Research)
Back in the time when businesses were predominantly “local” and to a large extent insulated from each others operations, it really didn’t matter very much how we defined the Business Impact of Information Risks, for we knew what we meant in each business and we didn’t have much need to share that meaning with others. 
(WHITE PAPER) READ ABSTRACT |

How to tackle trust management: Impact sensitivity categorisation by ComputerWeekly.com

November 09, 2010 - (Free Research)
Information must be classified using an appropriate Classification Scheme as defined in the Jericho Forum’s Information Classification2 position paper. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 30, 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013) by IBM

October 16, 2013 - (Free Research)
This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of CA Identity Manager by CA Technologies.

February 19, 2010 - (Free Research)
In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution by Perimeter eSecurity

January 2012 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact™ Of Panduit’s Unified Physical Infrastructure℠ (UPI) by Panduit

August 2010 - (Free Research)
This study illustrates the financial impact of moving from disparate and aging wiring systems to an integrated, building-wide IT connectivity infrastructure. 
(WHITE PAPER) READ ABSTRACT |

The Economic and Productivity Impact of IT Security on Healthcare by Imprivata

May 2013 - (Free Research)
This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Security Breaches and Minimizing the Impact by Dell SecureWorks UK

May 2013 - (Free Research)
Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach. 
(WHITE PAPER) READ ABSTRACT |

Quantifying the Impact of Network-Based Attacks by Dell Software

December 2012 - (Free Research)
This document gives you some guidelines on how to assess the impact of network-based attacks and suggests techniques for creating your own economic model. Get your copy today. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis by McAfee, Inc.

August 2009 - (Free Research)
This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study. 
(ANALYST REPORT) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension

September 2012 - (Free Research)
Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Messaging and Web Threats by Trend Micro, Inc.

May 2008 - (Free Research)
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks. 
(WHITE PAPER) READ ABSTRACT |

Economic Impact of a BlackBerry Solution in North American Enterprises by BlackBerry

February 2010 - (Free Research)
In this analyst report, Forrester Consulting examines the total economic impact and potential return on investment (ROI) enterprises can realize by deploying mobility solutions using BlackBerry® smartphones and BlackBerry® Enterprise Server software. 
(ANALYST REPORT) READ ABSTRACT |

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by Paymetric, Inc.

January 2008 - (Free Research)
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information. 
(WHITE PAPER) READ ABSTRACT |

WAN Speak Musings – Volume III by ComputerWeekly.com

November 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Tracked, Hacked and Attacked by IBM

November 2013 - (Free Research)
Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost. 
(WHITE PAPER) READ ABSTRACT |

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497) by Klocwork

November 2013 - (Free Research)
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security. 
(WEBCAST) READ ABSTRACT |

How Key MDM Features Affect Mobile Security Policy Management by BlackBerry

September 2013 - (Free Research)
In this expert guide from SearchSecurity.com, find out how to tackle developing your organization's mobile policy around the latest MDM solutions. Discover which features impact security the most and how you can establish a strategy that compliments them. 
(EGUIDE) READ ABSTRACT |

2011 Second Annual Ponemon Cost of Cybercrime Study by ArcSight, an HP Company

August 2011 - (Free Research)
This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(ANALYST REPORT) READ ABSTRACT |

Second 'Annual Cost of Cyber Crime' Study by ArcSight, an HP Company

August 2011 - (Free Research)
This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(ANALYST REPORT) READ ABSTRACT |

Endpoint Security Value Calculator by Lumension

August 2009 - (Free Research)
This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line. 
(ASSESSMENT TOOL) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts