Impact SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Impact Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Network Security
 •   Storage Security
 •   Endpoint Security

Related Searches
 •   Employee Impact Secure
 •   Expense Impact Secure
 •   Impact Secure Florida
 •   Impact Secure Performance
 •   Impact Secure Profile
 •   Impact Secure Schedules
 •   Impact Secure Supplier
 •   Policies Impact
 •   Recovery Impact Secure
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution by Perimeter eSecurity

January 20, 2012 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations. 
(WHITE PAPER) READ ABSTRACT |

The Ten Best Practices for Secure Software Development by ISC2

December 15, 2010 - (Free Research)
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software. 
(WHITE PAPER) READ ABSTRACT |

Impact of Cloud on IT Consumption Models: Top 10 Insights by Cisco Systems, Inc.

November 08, 2013 - (Free Research)
This whitepaper reviews the conclusions from a survey of IT leaders around the world. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Information Protection - The Impact of Big Data by IBM

March 31, 2013 - (Free Research)
In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized. 
(WHITE PAPER) READ ABSTRACT |

The Economic and Productivity Impact of IT Security on Healthcare by Imprivata

May 31, 2013 - (Free Research)
This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations. 
(WHITE PAPER) READ ABSTRACT |

System z, x86, UNIX: Which is more secure? by IBM

November 15, 2013 - (Free Research)
Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution by RSA, The Security Division of EMC

August 2008 - (Free Research)
SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs. 
(ARTICLE) READ ABSTRACT |

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution by Sunbelt Software

August 2008 - (Free Research)
SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs. 
(ARTICLE) READ ABSTRACT |

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013) by IBM

October 2013 - (Free Research)
This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements. 
(WHITE PAPER) READ ABSTRACT |

Effective print management by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy. 
(ANALYST REPORT) READ ABSTRACT |

Top Tips to Securing your Business Reputation by AVG Technologies USA, Inc.

April 2009 - (Free Research)
Reputation is everything in the world of a small business. It often takes years to establish a good reputation, but unfortunately it can take far less time lose one. Read this paper to learn tips that will help you keep your reputation secure. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Messaging and Web Threats by Trend Micro, Inc.

May 2008 - (Free Research)
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks. 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC

December 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution by Quantum Corporation

October 2008 - (Free Research)
Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by IBM

December 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

Case Study: Capita Group PLC by Druva Software

December 2010 - (Free Research)
Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions. 
(CASE STUDY) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

Securing your Midsized Business by IBM

October 2013 - (Free Research)
This guide explores security management strategies and how to combat the growth of sophisticated threats. 
(WHITE PAPER) READ ABSTRACT |

Windows® XP Migration: Protect and Secure Critical Data by CommVault Systems, Inc.

April 2014 - (Free Research)
This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system. 
(WHITE PAPER) READ ABSTRACT |

The Importance of Securing Mobile Device Platforms by Dell Software

September 2013 - (Free Research)
Access this informative resource to discover which mobile security solutions are recommended for Apple, Android and Microsoft Windows devices. 
(WHITE PAPER) READ ABSTRACT |

Keep Mission Critical Applications Online and Your Data Secure by IBM

November 2013 - (Free Research)
Are you searching for a way to keep mission-critical apps online and your data secure? This quick infographic offers insight into security challenges that may affect your organization and a tool to help conquer these obstacles. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best Practices for Developing Secure Applications by IBM

November 2010 - (Free Research)
This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts