Information Security Requirement ListWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Security Requirement List returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Enterprise Information Integration/ Metadata Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Managed Security Services
 •   Virtualization
 •   Intrusion Prevention Solutions

Related Searches
 •   Based Information Security
 •   Information Benefits
 •   Information Portals
 •   Information Security Costs
 •   Information Security West Virginia
 •   Maintain Information
 •   Proposals Information Security
 •   Webcasts Information Security
 •   Work Information Security Requirement
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 20, 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 31, 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

Achieving PCI compliance with Dell SecureWorks' security services by Dell, Inc.

May 18, 2011 - (Free Research)
It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance. 
(WHITE PAPER) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 11, 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine

March 15, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act. 
(EGUIDE) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 10, 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

10 Cloud Storage Requirements from Marc Staimer by IBM

December 28, 2011 - (Free Research)
This E-Guide was designed to get the facts straight on cloud as it defines cloud storage and lists Chief Dragon Slayer of Dragon Slayer Consulting, Marc Staimer’s top cloud storage requirements. Also in this guide – discussion around the recent cloud washing phenomenon created by marketers and vendors. 
(EGUIDE) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 10, 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

A Buyer's Guide to Data Loss Protection Solutions by Websense, Inc.

July 14, 2011 - (Free Research)
Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution. 
(WHITE PAPER) READ ABSTRACT |

Business-Class Security and Compliance for On-Demand Instant Messaging by WebEx Communications, Inc.

December 01, 2006 - (Free Research)
Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 03, 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

SmartDL 4.0, Dynamic Group Management by Imanami

August 01, 2006 - (Free Research)
Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution. 
(TRIAL SOFTWARE)

Enterprise Strategy Group (ESG) Report: Today's Information Access Requirements Outpace Open Source Search Options by Attivio, Inc.

March 24, 2010 - (Free Research)
This paper examines the new information access functionality and administrative requirements - including enterprise concerns for scalability, high availability, and fault tolerance - while measuring the ability of current open source alternatives to meet these demands. This report also explores the financial aspects of open source search adoption. 
(ANALYST REPORT) READ ABSTRACT |

CW+: Overview of the Open Group Security Forum by ComputerWeekly.com

October 19, 2010 - (Free Research)
The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations. 
(WHITE PAPER) READ ABSTRACT |

How to Choose an Enterprise-Class Job Scheduling Solution Evaluation Guide by Cisco Systems, Inc.

November 24, 2010 - (Free Research)
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 13 December 2011: Read this week’s special issue announcing the UKtech50 – the 50 most influential people in UK IT. by ComputerWeekly.com

December 09, 2011 - (Free Research)
In this week's special issue of Computer Weekly, we reveal the UKtech50 - our list of the 50 most influential people in UK IT. This year's winner is Mike Lynch, CEO of Autonomy, who talks in an exclusive interview about his hopes for the UK technology industry, and life at HP since the company's 7bn GBP acquisition. Download the new issue now. 
(EZINE) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 10, 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

The CMO–CIO disconnect by ComputerWeekly.com

August 27, 2013 - (Free Research)
This study from Accenture reveals the extent of the disconnect between chief marketing officers (CMOs) and chief information officers (CIOs), and offers advice on how to bridge the gap. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Buyer’s Guide for Access Management by Oracle Corporation

April 26, 2011 - (Free Research)
Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: 10 Cloud Storage Requirements to Know by Gluster (E-mail this company)

November 09, 2011 - (Free Research)
This SearchCloudStorage.com E-Guide features a list of technical requirements that a cloud storage offering should meet and also explores the cloud washing phenomenon created by marketers and vendors. Learn how to define and implement a cloud storage solution, and gain insight into the differences between public, private and hybrid cloud solutions. 
(EGUIDE) READ ABSTRACT |

Useful tips on how to choose the right Cloud or ERP solution by IQMS

October 02, 2013 - (Free Research)
This e-guide outlines important issues for manufacturers to consider when establishing requirements. Mike Canniff, senior partner at Mercury Consulting and professor of management information systems at the University of the Pacific, provides his insights for cloud ERP integrations. 
(EGUIDE) READ ABSTRACT |

E-Guide: Choosing enterprise wireless LAN equipment by NETGEAR Inc.

March 09, 2011 - (Free Research)
802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements. 
(EGUIDE) READ ABSTRACT |

HP Data Protector 6.1 software VMware Integration Installation Best Practice by Hewlett-Packard Company

November 17, 2009 - (Free Research)
This white paper discusses the different ways for installing the Data Protector package and shows the pros and cons of each method. You can choose the method which fits your requirements. At the end of this white paper, a troubleshooting chapter lists error messages and necessary steps for fixing these problems. 
(WHITE PAPER) READ ABSTRACT |

Connecting Virtual Desktop and Disaster Recovery by Forsythe

November 20, 2009 - (Free Research)
Connecting virtual desktop technology with the disaster recovery process has probably not been a major focus for organizations; however, integrating a disaster recovery plan for the virtual desktop is moving up organizational priority lists for a multitude of reasons. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts