Integrated Security Solutions FirmsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Integrated Security Solutions Firms returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Business Intelligence Solutions
 •   Anti-Virus Solutions
 •   Virtualization
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Benefits Integrated Security
 •   Demonstration Integrated
 •   Integrated Security Solutions Asset
 •   Integrated Security Solutions Businesses
 •   Integrated Security Solutions Schedules
 •   Integrated Security Solutions Storage
 •   Integrated Tutorials
 •   Multi Integrated
 •   Sheets Integrated Security
 •   Test Integrated Security
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Integrated Security - McAfee Software and Intel vPro Technology Video by Intel

December 28, 2012 - (Free Research)
This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more. 
(WEBCAST) READ ABSTRACT |

Laying the IT Security Foundation by Lumension

April 06, 2009 - (Free Research)
Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker. 
(WHITE PAPER) READ ABSTRACT |

The Value of Integrated Security by Cisco Systems, Inc.

November 07, 2008 - (Free Research)
Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection. 
(WHITE PAPER) READ ABSTRACT |

An Integrated Security Solution for the Virtual Data Center and Cloud by Juniper Networks, Inc.

February 16, 2012 - (Free Research)
In this paper, explore the implications of virtualized workloads and discover an effective approach to providing pervasive and consistent protection for the entirety of the evolving data center. 
(WHITE PAPER) READ ABSTRACT |

Integrating Security into Development, No Pain Required by IBM

April 24, 2012 - (Free Research)
There are substantial security benefits to developers and security personnel working together, yet they are often viewed as being like oil and water. In this paper, discover how to integrate software development and security effectively and pain-free by using the right tools and techniques. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Integrating security into the ALM lifecycle by IBM

November 16, 2011 - (Free Research)
In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management. 
(EGUIDE) READ ABSTRACT |

E-Guide: Integrating security into the ALM lifecycle by IBM

November 21, 2011 - (Free Research)
In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management. 
(EGUIDE) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle by IBM

July 08, 2009 - (Free Research)
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Integrated Software Enhances Enterprise Security by Intel Corporation

November 2005 - (Free Research)
Intel IT is deploying an integrated security software solution that cuts response time to threats by 90 percent, while addressing enterprise needs for rapid software installation, scalability, reliability, and reporting. 
(ARTICLE)

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Maximize Your Return on Investment for Virtualization and Cloud Computing by Trend Micro, Inc.

October 2011 - (Free Research)
View this paper to discover how platform-aware security can provide integrated security designed for virtual servers, VDI and the cloud, without sacrificing performance or management, ultimately maximizing your return on investment (ROI). 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Expert insights to application security testing and performance by IBM

November 2011 - (Free Research)
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle. 
(EGUIDE) READ ABSTRACT |

Cisco PIX 501 Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Security Across the Enterprise: Protect and Empower Your Branch Offices by Cisco Systems, Inc.

October 2008 - (Free Research)
Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

EX Series Ethernet Switches by Juniper Networks, Inc.

November 2011 - (Free Research)
High-performance businesses demand a high-performance network infrastructure that provides fast, secure and reliable delivery of the applications that drive the business. Switches deployed in regional offices, campuses and data centers enable these business processes by connecting users. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Avoiding Application Security Pitfalls by IBM

January 2011 - (Free Research)
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them. 
(EGUIDE) READ ABSTRACT |

The Role of Security Management in Achieving "Continuous Compliance" by CA Technologies.

December 2007 - (Free Research)
There's a focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. This paper details the benefits of continuous compliance, which include reduction of risk and cost. 
(WHITE PAPER) READ ABSTRACT |

Securing the Borderless Enterprise by Websense, Inc.

February 2010 - (Free Research)
A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Reduce Risks and Protect Critical Information with Ease - Presentation Transcript by Symantec

August 2010 - (Free Research)
The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Weaponized malware now threatens the private sector by Lumension

September 2012 - (Free Research)
Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks. 
(WHITE PAPER) READ ABSTRACT |

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services by GlobalSign

March 2011 - (Free Research)
This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts