It And Security PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It And Security Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Vulnerability Assessment
 •   Security Policies
 •   Network Security
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Fraud Detection & Prevention
 •   Wireless Security
 •   Application Security

Related Searches
 •   Benefits Of It And Security
 •   Define It And Security
 •   Definitions It And Security
 •   It And Computing
 •   It And Firm
 •   It And Parts
 •   National It And
 •   Orders It
 •   Packages It And Security
 •   Testing It
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Multi-Layer Security Platforms: The New Definition of Best of Breed by Fortinet, Inc.

June 01, 2006 - (Free Research)
Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager by McAfee, Inc.

October 04, 2010 - (Free Research)
Some IT and security teams wonder if automated vulnerability management is important, given pressing demands for other IT projects and investments. Why not stick with manual processes or traditional scanners? It is possible that McAfee® Vulnerability Manager may not be right for your organization. Use this simple evaluation checklist to find out. 
(WHITE PAPER) READ ABSTRACT |

2012 Bit9 Cyber Security Research Report by Bit9, Inc.

May 23, 2012 - (Free Research)
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers. 
(WHITE PAPER) READ ABSTRACT |

Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company by Webroot

May 31, 2013 - (Free Research)
This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 30, 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC

December 30, 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market by ArcSight, an HP Company

March 04, 2011 - (Free Research)
This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints. 
(WEBCAST) READ ABSTRACT |

Cisco Any Device: Planning a Productive, Secure and Competitive Future by Cisco (E-mail this company)

August 31, 2011 - (Free Research)
Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security. 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by IBM

December 30, 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Authentication in the Enterprise: Current and Changing Requirements by PistolStar, Inc.

August 2009 - (Free Research)
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Costs of IT Security Management by CA Technologies.

January 2006 - (Free Research)
This paper highlights some important operational efficiencies that can be gained by deploying an integrated IAM strategy. Learn more about how IAM can help increase user productivity, reduce help desk costs, protect corporate assets and much more. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment. 
(WHITE PAPER) READ ABSTRACT |

Flexible Workplace: Steps for Enhancing Productivity by IBM

November 2012 - (Free Research)
This white paper highlights best practices for achieving success with a flexible workplace. Inside, learn how forward thinking organizations are already spurring innovation while reducing costs. 
(WHITE PAPER) READ ABSTRACT |

Next Generation Authentication for the Mobile Ready Enterprise by RSA, The Security Division of EMC

April 2014 - (Free Research)
This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices. 
(WHITE PAPER) READ ABSTRACT |

The New Workplace: Supporting Bring your own device by IBM

November 2012 - (Free Research)
This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels. 
(WHITE PAPER) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Limited

January 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

The RSA GRC Reference Architecture by RSA, The Security Division of EMC

June 2013 - (Free Research)
With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business. 
(WHITE PAPER) READ ABSTRACT |

5 Things to Look for in a Cloud Provider When it Comes to Security by Oracle Corporation

December 2013 - (Free Research)
Many organizations today are moving their business to the cloud to save money and increase efficiency. But, this comes with security and related operational risks. In this white paper, find five important things to look for in a cloud provider, with your cloud's security in mind. 
(WHITE PAPER) READ ABSTRACT |

Security Management 2.5: Replacing Your SIEM Yet? by IBM

February 2014 - (Free Research)
This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Enterprise Network by Infoblox

August 2013 - (Free Research)
This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps. 
(WHITE PAPER) READ ABSTRACT |

Rethinking your Enterprise Security: Critical Priorities to Consider by Hewlett-Packard Limited

May 2012 - (Free Research)
In this white paper, explore a sustainable approach to security designed to address the latest generation of vulnerabilities spawned from today's IT trends. Read on to access four keys to establish end-to-end security and five critical security priorities you must be aware of. 
(WHITE PAPER) READ ABSTRACT |

End Point Security in Medium and Large Organizations by Dell, Inc.

March 2014 - (Free Research)
This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts