Learning About Automated SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Learning About Automated Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Security
 •   Enterprise Data Protection and Privacy
 •   Automated Security Auditing/ Source Code Analysis
 •   Network Security
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Security Policies
 •   Virtualization

Related Searches
 •   Guides Learning About
 •   Learning About Automated Manage
 •   Learning About Automated Pricing
 •   Learning About Facts
 •   Learning Monitoring
 •   Learning Schedule
 •   Learning Texas
 •   Need Learning About Automated
 •   Quality Learning About
 •   Supplier Learning About
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.

February 10, 2009 - (Free Research)
Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security. 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 20, 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions by Symantec Corporation

April 25, 2014 - (Free Research)
View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations. 
(WEBCAST) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 31, 2014 - (Free Research)
Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console. 
(WHITE PAPER) READ ABSTRACT |

Accounts Payable: Building a “Lean and Green” Invoice-to-Pay Process by Dolphin

March 10, 2010 - (Free Research)
Business processes are expected to run lean and green. The Accounts Payable process that runs with optimal efficiency and accuracy will diagnose bottlenecks in seconds, generate minimal waste and keep vendors and partners happy with fast inquiry response and timely payments. Read this paper from Dolphin Corporation to learn about automating AP. 
(WHITE PAPER) READ ABSTRACT |

Reducing Risks through Flexible and Automatic Oracle Data Protection by BakBone

January 17, 2008 - (Free Research)
For Oracle administrators, backup and recovery can be a daunting challenge. Read this white paper to learn about automated tools for Oracle databases that combat these problems by ensuring the highest levels of data protection, availability and retention. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 28, 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Web Ops 2.0: Achieving Fully Automated Provisioning by Puppet Labs

October 26, 2011 - (Free Research)
Today’s organizations need to get out of Web Operations 1.0, mired in legacy tools, outdated approaches, and low expectations, and into Web 2.0 where tools and procedures are built from the ground up for high quality efficiency, reliability, and agile operations. Access this paper to learn about fully automated provisioning for Web Operations 2.0. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

FalconStor® RecoverTrac™: Fully Automated Disaster Recovery by FalconStor Software

April 16, 2013 - (Free Research)
This two-minute video details the features and benefits FalconStor's award-winning RecoverTrac DR technology can provide your company, including: improved productivity, increased profitability and fully automated data recovery when disaster strikes. 
(VIDEO) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 18, 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 01, 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.

April 14, 2010 - (Free Research)
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them. 
(WHITE PAPER) READ ABSTRACT |

How to Effectively Secure Electronic Health Records by HP and Intel

February 29, 2012 - (Free Research)
In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection! 
(WHITE PAPER) READ ABSTRACT |

Finding the Right Automated Tiered Storage by NetApp

June 27, 2012 - (Free Research)
This SearchStorage.com E-Guide is here to help you decide which automated storage tiering option is the best fit for your data storage environment and to explain data movement in Tier 0 storage. 
(EGUIDE) READ ABSTRACT |

Security Intelligence: The Smart Way to Keep the Cloud Safe by IBM

October 31, 2013 - (Free Research)
This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Security Intelligence for Energy and Utilities Companies by IBM

July 31, 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

The ROI of Automated Agentless Endpoint Management by Promisec

May 21, 2014 - (Free Research)
This informative guide explores the impact of endpoint monitoring and control solutions on organizations. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle by IBM

August 02, 2011 - (Free Research)
As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more. 
(WHITE PAPER) READ ABSTRACT |

Current Storage Trends: SSD & Virtual NAS by Avere Systems

February 06, 2012 - (Free Research)
Check out this E-Guide to learn about emerging storage solutions like solid state (SSD), virtualization-optimized storage and automated tiering. You'll also learn about the latest trends in enterprise storage today, discover the ins and outs of virtual NAS and learn four ways to virtualize file access. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Panda Cloud Systems Management: Management Datasheet by Panda Security

July 15, 2013 - (Free Research)
Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts