It Security MethodologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Security Methodology returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Anti-Virus Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Treasury / Cash / Risk Management

Related Searches
 •   Capacity It Security
 •   Costs It Security
 •   Faq It Security
 •   Faqs It Security Methodology
 •   It Applications
 •   It Review
 •   It Security Methodology Internet
 •   It Security Online
 •   It Security Web Casts
 •   Publishing It
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 25, 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

How to tackle IT audit and compliance by ComputerWeekly.com

November 09, 2010 - (Free Research)
IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment. 
(WHITE PAPER) READ ABSTRACT |

Integrating Vulnerability Assessment and Remediation by Lumension

August 2008 - (Free Research)
An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

2009 Annual Study: UK Enterprise Encryption Trends by PGP Corporation

July 2009 - (Free Research)
Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection. 
(ANALYST REPORT) READ ABSTRACT |

10 Hot Skills for 2009 by Global Knowledge

May 2009 - (Free Research)
With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Exchange 2010 Roadmap Series - Backup and Recovery by Dell, Inc. and Intel®

December 2009 - (Free Research)
In this presentation transcript, featuring Exchange pro, Lee Benjamin, you'll learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Exchange 2010 Roadmap Series: Backup and Recovery by Dell, Inc. and Intel®

December 2009 - (Free Research)
In this expert mediacast, featuring Exchange pro, Lee Benjamin, learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls. 
(WEBCAST) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

How Are DDoS Attacks Evolving? by Neustar®

May 2014 - (Free Research)
This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and Backup: Advances in Technology and Lessons Learned by Early Adopters – Presentation Transcript by EqualLogic, Inc.

March 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz traces the role of backup in virtual environments, starting with the early adopters and moving to today's top backup methodologies. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and backup: Technology advances and lessons learned by early adopters by EqualLogic, Inc.

February 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz traces the role of backup in virtual environments, starting with the early adopters and moving to today's top backup methodologies. 
(WEBCAST) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Guidance for Calculation of Efficiency (PUE) in Real Data Centers by APC by Schneider Electric

January 2010 - (Free Research)
Unfortunately, commonly published efficiency data is not computed using a standard methodology making it difficult to properly benchmark infrastructure efficiency in data centers. This paper explains the problem and describes a standardized method for classifying data center loads for efficiency calculations. 
(WHITE PAPER) READ ABSTRACT |

Backup and Recovery: The Benefits of Multiple De-duplication Policies by Quantum Corporation

October 2008 - (Free Research)
This white paper explains the differences between the de-duplication approaches, discusses the strengths and limitations of each, shows how different backup tasks are likely to benefit from them, and talks about the business benefits. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Solution Spotlight: A Guide to Agile Testing for QA and Test Managers by IBM

December 2012 - (Free Research)
In this expert e-guide, Lisa Crispin, co-author of the book Agile Testing explains why a testing taxonomy such as the Agile testing quadrants can be a highly effective tool to help with these uncertainties. Read on to learn how the quadrants work and how they can be applied in your organization. 
(EGUIDE) READ ABSTRACT |

BYOD: Policy Creation and it's Increasingly Growing Need by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy. 
(EGUIDE) READ ABSTRACT |

IDC Vendor Spotlight - Using a Hosted Service for Holistic Email Management by Mimecast

November 2008 - (Free Research)
Effective email management solutions provide a holistic approach that encompasses the related issues of archiving, business continuity, and security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts