India Security ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: India Security Management returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Endpoint Security
 •   Managed Security Services
 •   Access Control

Related Searches
 •   Enterprise India Security Management
 •   India Outsource
 •   India Security Demand
 •   India Security Examples
 •   India Security Management Buys
 •   India Security Management Programs
 •   Licenses India Security
 •   Office India Security Management
 •   Reviews India Security Management
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

IAM Evaluation And Deployment Guidelines by OpenIAM

January 10, 2014 - (Free Research)
Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success. 
(EGUIDE) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 31, 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Protecting Sensitive Data and Resources Throughout the Organization by CA (India) Technologies Pvt. Ltd

March 01, 2009 - (Free Research)
CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 15 May 2012: Overhauling banking IT by ComputerWeekly.com

May 15, 2012 - (Free Research)
This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital? 
(EZINE) READ ABSTRACT |

CW Special report on Wipro by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

CW Special Report on TCS by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Evolving Security: 5 Reasons to Outsource Network Security Management in Today's Threat Environment by XO Communications

April 30, 2012 - (Free Research)
Discover five reasons why outsourcing your network security management can help you combat malware, hackers, and the evolving threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 15, 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.

December 02, 2008 - (Free Research)
Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall. 
(ARTICLE) READ ABSTRACT |

How Can Security Management Technologies Help Me with PCI Compliance? by CA Technologies.

August 11, 2009 - (Free Research)
Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security Management (Antimalware Technologies) Technical Guide by SearchSecurity.com

September 11, 2013 - (Free Research)
This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months. 
(EGUIDE) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 10, 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK)

Protection Starts with Security Management Solutions from Novell by Novell, Inc.

March 07, 2011 - (Free Research)
Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security - an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions. 
(WHITE PAPER) READ ABSTRACT |

Protection Starts with Security Management Solutions from Novell by Novell, Inc.

July 28, 2010 - (Free Research)
Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Costs of IT Security Management by CA Technologies.

February 29, 2012 - (Free Research)
This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues. 
(WHITE PAPER) READ ABSTRACT |

Open Information Security Management Maturity Model (O-ISM3) by ComputerWeekly.com

January 12, 2011 - (Free Research)
The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements. 
(WHITE PAPER) READ ABSTRACT |

Reducing IT TCO with Effective Endpoint Security Management by Lumension

August 12, 2009 - (Free Research)
This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO. 
(PODCAST) READ ABSTRACT |

Security Blanket by TCS: Enterprise Security Management by Trusted Computer Solutions

February 12, 2010 - (Free Research)
Read this paper to learn how Security Blanket includes pre-defined security guidelines, called Profiles, from some of the most respected security industry leaders in the world. 
(WHITE PAPER) READ ABSTRACT |

Security Management 2.5: Replacing Your SIEM Yet? by IBM

February 01, 2014 - (Free Research)
This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment. 
(WHITE PAPER) READ ABSTRACT |

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet? by IBM

February 01, 2014 - (Free Research)
This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for a Next-Generation SIEM: Delivering Operational Efficiency and Lower Costs Through An Integrated Approach to Network Security Management by Q1 Labs, an IBM Company

October 07, 2010 - (Free Research)
The selection of the most effective IT technology is a major concern for companies of all sizes, across almost every industry. Read this white paper to learn more about how Q1 Labs' next-generation security information and event management solutions can help protect your IT assets at a lower cost to the company. 
(WHITE PAPER) READ ABSTRACT |

The Role of Security Management in Achieving "Continuous Compliance" by CA Technologies.

December 28, 2007 - (Free Research)
There's a focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. This paper details the benefits of continuous compliance, which include reduction of risk and cost. 
(WHITE PAPER) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts