Information Security Manager TrainingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Security Manager Training returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   IT Training and Certification
 •   Web-Based Training and eLearning
 •   Computer-Based Training
 •   Endpoint Security
 •   Application Security
 •   Routers

Related Searches
 •   Function Of Information Security
 •   Global Information Security Manager
 •   Indian Information Security Manager
 •   Information Payment
 •   Information Security Code
 •   Information Security Manager File
 •   Information Security West Virginia
 •   Media Information
 •   Product Information Security
 •   Technical Information Security
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 13, 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Open Information Security Management Maturity Model (O-ISM3) by ComputerWeekly.com

January 12, 2011 - (Free Research)
The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements. 
(WHITE PAPER) READ ABSTRACT |

Security Information Management Systems Aspire to Real-Time Security by Hewlett-Packard Company

April 24, 2013 - (Free Research)
Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status. 
(EGUIDE) READ ABSTRACT |

February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment” by Information Security Magazine

January 31, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation. 
(EGUIDE) READ ABSTRACT |

September Information Security Magazine by SearchSecurity.com

August 30, 2013 - (Free Research)
Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come. 
(EZINE) READ ABSTRACT |

Information Security E-Zine – June 2014 by SearchSecurity.com

June 02, 2014 - (Free Research)
Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios? 
(EZINE) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

August 18, 2009 - (Free Research)
The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Every Man's Guide to Combat Threats Within Your Organization by ISC2

June 03, 2009 - (Free Research)
This eGuide highlights how mobile computing is more than just a trend, what cybersecurity experts have to say about information warfare, and what you can do to enhance team intelligence. 
(EGUIDE) READ ABSTRACT |

Security the future: Keeping up with the business by ComputerWeekly.com

March 01, 2013 - (Free Research)
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

Provide Better Visibility and Manageability across Network Security Tools by WatchGuard Technologies, Inc.

September 30, 2013 - (Free Research)
Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment. 
(ANALYST REPORT) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 01, 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Information Security IT Decision Checklist: Security Information and Event Management by ArcSight, an HP Company

July 28, 2011 - (Free Research)
This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process. 
(EGUIDE) READ ABSTRACT |

Information Security - IT Decision Checklist: Application Security by Ounce Labs, an IBM Company

December 31, 2009 - (Free Research)
Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer. 
(EGUIDE) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 12, 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

U.S. Army Relies on Globalscape® to Protect Critical Data by GlobalScape

December 31, 2013 - (Free Research)
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS). 
(CASE STUDY) READ ABSTRACT |

E-Guide A Decision Maker’s Guide to Log Management by ArcSight, an HP Company

October 27, 2010 - (Free Research)
While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs. 
(EGUIDE) READ ABSTRACT |

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Take Advantage of Oracle's 2 Day DBA Course by Oracle Corporation

February 25, 2009 - (Free Research)
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions. 
(TRAINING GUIDE) READ ABSTRACT |

U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data by GlobalScape

June 24, 2011 - (Free Research)
Now you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well. 
(CASE STUDY) READ ABSTRACT |

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training by Red Hat & IBM

December 08, 2010 - (Free Research)
When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more! 
(EBOOK)

Get Certified - Avaya Communication Manager by Global Knowledge

May 08, 2013 - (Free Research)
The Avaya Professional Credential Program is designed to make sure that individuals have the knowledge and skills to successfully sell, design, implement (install), and maintain Avaya products. 
(WHITE PAPER) READ ABSTRACT |

Protecting SharePoint Data Long Term by Varonis

July 30, 2009 - (Free Research)
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help. 
(WHITE PAPER) READ ABSTRACT |

Cisco IT GRC Security Assessment Service by Cisco Systems, Inc.

June 12, 2009 - (Free Research)
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts