Information Designing SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Designing Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Policies
 •   Network Security
 •   Authentication / Password Management
 •   Security Monitoring
 •   Identity Management/ User Provisioning
 •   Disaster Recovery
 •   Storage Security
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Importing Information Designing
 •   Information Designing Manufacturer
 •   Information Designing Security Coding
 •   Information Designing Security Mac
 •   Information Designing Security Standard
 •   Information Designing Security Utility
 •   Proposal Information
 •   Secure Information
 •   Study Information
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

The Dollars and Sense of Web Identity Management: How Saas Cuts the High Costs of Web Access and SSO by 75% by Symplified

August 2008 - (Free Research)
This analysis presented by Symplified, shows the compelling Software as a Service (SaaS) Total Cost of Ownership (TCO) advantages over software, driving identity lifecycle costs down by more than 75% based on real-world data. Read this paper to learn more 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise by Citrix Systems, Inc. (E-mail this company)

August 2013 - (Free Research)
This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Transforming Information Security: Designing State-of-the-Art Extended Team by RSA, The Security Division of EMC

December 2013 - (Free Research)
This informative whitepaper explores strategies for designing a state-of-the-art security team. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Discover: New Backup Strategies Designed to StoreOnce by Hewlett-Packard Limited

January 2011 - (Free Research)
This presentation transcript from  how to manage the data with different data reduction technologies.  It also outlines examples of how to improve disaster recovery plans using centralised remote replication and how you can design a business continuity strategy that is not only highly efficient, but also future proof using HP StoreOnce. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

Jericho Forum - the vision by ComputerWeekly.com

November 2010 - (Free Research)
Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation. 
(WHITE PAPER) READ ABSTRACT |

Cost Effective Techniques for Designing the Data Warehouse by Embarcadero Technologies, Inc.

November 2010 - (Free Research)
A cost effective data warehouse project doesn't have to be an oxymoron. Rather than committing to a full-fledged waterfall style approach, it is possible to build a data warehouse incrementally and inexpensively, while at the same time preserving high-level architectural goals that lead to a true enterprise data warehouse. View this webcast now. 
(WEBCAST) READ ABSTRACT |

How to use Collaboration Oriented Architectures by ComputerWeekly.com

November 2010 - (Free Research)
Collaboration Oriented Architectures (COA) describes information architectures that comply with the COA framework, which in turn is described in the associated COA Framework paper1. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

December 2013 - (Free Research)
This informative resource details the major components that make desktop virtualization secure by design. 
(WHITE PAPER) READ ABSTRACT |

Secure Search: Balancing Security with the Need for Information Access by EMC Corporation

May 2008 - (Free Research)
This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Mobilizing Windows Applications by Citrix

December 2013 - (Free Research)
This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

August 2009 - (Free Research)
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network. 
(WHITE PAPER) READ ABSTRACT |

Achieving ISO 27001 Compliance using Titus Solutions by TITUS

November 2010 - (Free Research)
This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents. 
(WHITE PAPER) READ ABSTRACT |

Business Oriented Information Architecture by Sybase, an SAP company

April 2012 - (Free Research)
This paper outlines an information architecture (IA) and why it is useful in determining everything from the robustness of IT projects to testing business process scenarios to see if they satisfy the wide-ranging needs of your business. Read this now to learn more about IA, including its basic design, how to start your program and more. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts