List Security ProgramWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: List Security Program returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Managed Security Services
 •   Virtualization
 •   Application Security
 •   Security Monitoring
 •   Enterprise Information Integration/ Metadata Management
 •   Storage Management

Related Searches
 •   Create List
 •   Expense List Security
 •   Functions Of List Security
 •   List Security Basics
 •   List Security Program Pay
 •   List Security Program Utility
 •   List Security Retail
 •   List Security West Virginia
 •   Operating List Security Program
 •   Recovery List Security Program
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Five critical steps to achieving an effective application security program by IBM

December 31, 2013 - (Free Research)
This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes. 
(WHITE PAPER) READ ABSTRACT |

IT Executive Guide to Security Intelligence by IBM

January 31, 2013 - (Free Research)
This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas. 
(WHITE PAPER) READ ABSTRACT |

Transitioning from Log Management and SIEM to Security Intelligence by IBM

January 01, 2013 - (Free Research)
Learn how security intelligence empowers organizations to maintain comprehensive and cost-effective threat prevention and risk aversion. 
(WHITE PAPER) READ ABSTRACT |

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

Emerging PaaS security tactics by SearchSecurity.com

May 2012 - (Free Research)
Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk. 
(EGUIDE) READ ABSTRACT |

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Top Ten IT Skills for 2014 by Global Knowledge

March 2014 - (Free Research)
This brief resource lists the top ten IT skills and technologies that are going to be in demand in 2014. The IT world changes quickly, and understanding these skills and technologies will help IT professionals remain relevant. 
(WHITE PAPER) READ ABSTRACT |

Information Governance: Business Imperative or Technology Asset? by Iron Mountain

May 2012 - (Free Research)
In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals. 
(EBRIEF) READ ABSTRACT |

Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

July 2010 - (Free Research)
To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains. 
(WHITE PAPER) READ ABSTRACT |

Top benefits of compliant records management by Iron Mountain

March 2012 - (Free Research)
When the world’s largest offshore drilling company wanted to lower the risks and costs associated with the increase of records management regulations, it sought out a qualified vendor to help create enterprise-wide compliant records management program.  Discover how this organization was able to significantly improve its records management. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 17 April 2012: How to ensure smartphone security by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT. 
(EZINE) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Top 10 Security Checklist for SOHO Wireless LANs by Global Knowledge Network, Inc.

May 2005 - (Free Research)
Discover the ten simple steps SOHO users can take to secure their wireless networks. 
(WHITE PAPER) READ ABSTRACT |

Five Procurement Guidelines You Can't Afford to Ignore by StarCite

August 2008 - (Free Research)
Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination. 
(WHITE PAPER) READ ABSTRACT |

Business-Class Security and Compliance for On-Demand Instant Messaging by WebEx Communications, Inc.

December 2006 - (Free Research)
Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM. 
(WHITE PAPER) READ ABSTRACT |

Advanced Persistent Threats: Insider Credentials at Risk by NetIQ

December 2013 - (Free Research)
This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out. 
(WHITE PAPER) READ ABSTRACT |

Metro Atlanta YMCA Better Aligns its Mission, Member Engagement, and Marketing Communications Activities Using Birst by Birst

October 2009 - (Free Research)
In an attempt to tailor and more effectively promote its programs, the Metro Atlanta YMCA turned to Birst for a new set of Business intelligence (BI) tools. Birst delivered with features that included automated dashboards and adhoc reporting at a fair price. Read on to learn the benefits YMCA experienced when they switched to Birst. 
(CASE STUDY) READ ABSTRACT |

10 Hot Skills for 2009 by Global Knowledge

May 2009 - (Free Research)
With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond. 
(WHITE PAPER) READ ABSTRACT |

KnowledgeStorm Advertising Overview: Build Brand Awareness among Technology Buyers by KnowledgeStorm, Inc (E-mail this company)

June 2007 - (Free Research)
If you're looking to build awareness and consideration of your brand among technology buyers that rely on KnowledgeStorm, our advertising solutions will help you reach your target audience. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly – 10 December 2013: The most influential people in UK IT by ComputerWeekly.com

December 2013 - (Free Research)
In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and also select 10 rising stars to look out for in 2014. We look back at the big changes in the datacentre environment this year. And we examine the growing popularity of agile development. Read the issue now. 
(EZINE) READ ABSTRACT |

Overcoming the Challenges of Green Procurement through eProcurement by Dimension Data Global

October 2008 - (Free Research)
This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 1 November 2011: Read this week's issue of the UK's leading technology publication, with the latest news, analysis and opinion for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we examine the IT challenges facing retailers in a world of multi-channel shopping; our latest Buyer's Guide looks at upgrading from Windows XP to Windows 7 as XP approaches the time Microsoft ceases support; and we kick-off this year's search for the most influential people in UK IT. Download the new issue now. 
(EZINE) READ ABSTRACT |

Seven Email Marketing Refreshes by Bronto Software

October 2008 - (Free Research)
This whitepaper will detail seven key points that will help you quickly enhance your email-marketing program. You may also find some low hanging opportunities that you weren't aware you were missing. 
(WHITE PAPER) READ ABSTRACT |

SmartDL 4.0, Dynamic Group Management by Imanami

August 2006 - (Free Research)
Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution. 
(TRIAL SOFTWARE)

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts