It Security TestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Security Test returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Security Policies
 •   Managed Security Services
 •   Anti-Virus Solutions
 •   Automated Security Auditing/ Source Code Analysis
 •   Vulnerability Assessment

Related Searches
 •   Companies It Security
 •   Framework It Security Test
 •   Graphs It Security Test
 •   It Delivery
 •   It Security Development
 •   It Security Test License
 •   It Security Test Usa
 •   Requirement It
 •   Site It Security
 •   Utility It
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 10, 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

IT Security: Built-In Protection with Intel vPro Technology by Intel

May 01, 2012 - (Free Research)
New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 22, 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

New Security Solutions Using Intel vPro Technology by Intel Corporation

April 02, 2009 - (Free Research)
Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case. 
(WHITE PAPER)

Increase security and ROI: The benefits of Intel vPro technology by Intel

April 28, 2010 - (Free Research)
Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family. 
(PRODUCT DEMO) READ ABSTRACT |

IT Security Management McAfee ePolicy Orchestrator Deep Command by Intel

December 31, 2011 - (Free Research)
This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013 by ComputerWeekly.com

January 08, 2013 - (Free Research)
In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now. 
(EZINE) READ ABSTRACT |

The E-Discovery “How-To” Guide: Practical Recommendations for Streamlining Corporate E-Discovery by Clearwell Systems

October 01, 2008 - (Free Research)
This paper breaks down the e-discovery process into phases, discusses best practices and relevant technologies for each phase, and provides a matrix to guide an e-discovery team’s decision making process. 
(WHITE PAPER) READ ABSTRACT |

Security Pay Rates: UK Permanent Salary Index February 2013 by ComputerWeekly.com

February 19, 2013 - (Free Research)
This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Enhanced Detection of Malware by Intel

December 03, 2009 - (Free Research)
We present a cloud-computing-based architecture that improves the resiliency of the existing solutions anti-malware solutions, and we describe our prototype that is based on existing Intel platforms. 
(JOURNAL ARTICLE)

Protecting Patient Data: Tips for The Health IT Pro by Intel

June 29, 2012 - (Free Research)
This E-Book from SearchHealthIT.com provides invaluable tips for health IT leaders who are considering data, hardware, network and backup tape encryption technologies for their organizations. 
(EBOOK) READ ABSTRACT |

An Introductory Breakdown of Trusted Computing by Intel

December 01, 2008 - (Free Research)
This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level. 
(TECHNICAL ARTICLE)

Presentation Transcript: Who Does What in Cloud: Navigating the Cloud Computing to Provide a Landscape by Intel

November 02, 2011 - (Free Research)
This presentation transcript will help viewers evaluate the saturated market to make educated decisions on which cloud providers best suit your requirements. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010 by SearchDataCenter.com

October 04, 2011 - (Free Research)
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment. 
(EBOOK) READ ABSTRACT |

The Many Faces of Software Testing by McCabe Software, Inc.

May 01, 2012 - (Free Research)
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected. 
(EGUIDE) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 30, 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Analyst advice for IT security leaders by IBM

March 31, 2013 - (Free Research)
Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best practices for pen testing Web applications by SearchSecurity.com

October 24, 2011 - (Free Research)
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls. 
(EGUIDE) READ ABSTRACT |

Evolving IT security threats: Inside Web-based, social engineering attacks by Websense, Inc.

September 02, 2011 - (Free Research)
In order to adequately defend IT infrastructure, organizations must have a solid understanding of the various attack methods that are effective today. This expert e-guide takes an in-depth look into the latest IT security threats and provides strategic recommendations on how to deal with them. 
(EGUIDE) READ ABSTRACT |

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests by McAfee, Inc.

March 09, 2009 - (Free Research)
In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab. 
(TEST RESULTS) READ ABSTRACT |

IT Security. Fighting the Silent Threat by Kaspersky Lab

October 09, 2013 - (Free Research)
Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks. 
(WHITE PAPER) READ ABSTRACT |

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security by Tripwire, Inc.

September 26, 2012 - (Free Research)
View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts