It Security DigitalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Security Digital returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Storage Security
 •   Endpoint Security
 •   Managed Security Services
 •   Anti-Virus Solutions
 •   Virtualization

Related Searches
 •   Balancing It
 •   Demos It Security Digital
 •   Directories It Security Digital
 •   Document It Security
 •   It Conversion
 •   It Security Digital Control
 •   It Security Web Casts
 •   It Trends
 •   Manufacturers It
 •   Workflow It Security
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 22, 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013 by ComputerWeekly.com

January 08, 2013 - (Free Research)
In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 13, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 06, 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

The future of digital forensics by ComputerWeekly.com

April 10, 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 13 May 2014: Retail's data challenge by ComputerWeekly.com

May 12, 2014 - (Free Research)
In this week's Computer Weekly, we look at how data analytics is driving a new approach to customer relationship management within the retail sector. Customer who shops in multiple channels offer greater value to retailers. We find out how auction site eBay has developed a bespoke data analytics architecture to track every customer interaction. 
(EZINE) READ ABSTRACT |

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 16, 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 12, 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Presentation Transcript: Content Monitoring in the Enterprise by Lumension

January 04, 2013 - (Free Research)
This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed by ComputerWeekly.com

April 22, 2014 - (Free Research)
In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks? 
(EZINE) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 20, 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

BDNA for Security: Strengthened Security Through Visibility by BDNA

June 07, 2011 - (Free Research)
Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Frost and Sullivan Whitepaper: Constant Access to Patient Care Applications and Information in a Digital World by VMware, Inc.

July 16, 2013 - (Free Research)
This informative resource explores best practices and the underlying value of hospital desktop virtualization, including where it can be the most beneficial and how to ensure effective deployment. 
(WHITE PAPER) READ ABSTRACT |

How to tackle Enterprise Information Protection & Control by ComputerWeekly.com

November 09, 2010 - (Free Research)
Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM). 
(WHITE PAPER) READ ABSTRACT |

Analyst advice for IT security leaders by IBM

March 31, 2013 - (Free Research)
Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Costs of IT Security Management by CA Technologies.

February 29, 2012 - (Free Research)
This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues. 
(WHITE PAPER) READ ABSTRACT |

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension

September 25, 2012 - (Free Research)
Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Avoiding 7 Common Mistakes of IT Security Compliance by Qualys, Inc.

April 01, 2009 - (Free Research)
This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals. 
(EGUIDE) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Security strategy essential to keep ahead of rapidly changing threats by ComputerWeekly.com

January 27, 2011 - (Free Research)
This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists. 
(WHITE PAPER) READ ABSTRACT |

Automating IT Security Audits to Demonstrate Compliance and Protect Data by NetIQ Europe

May 18, 2011 - (Free Research)
This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits. 
(WHITE PAPER) READ ABSTRACT |

IT Security: Built-In Protection with Intel vPro Technology by Intel

May 01, 2012 - (Free Research)
New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts