List Security ProgramWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: List Security Program returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Wireless Technologies and Mobile Computing
 •   Security Policies
 •   Managed Security Services
 •   Virtualization
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Enterprise Information Integration/ Metadata Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Storage Management

Related Searches
 •   Costs List Security
 •   Example List Security
 •   File List Security Program
 •   Internet List Security
 •   List Audit
 •   List Security Check
 •   List Security Comparison
 •   List Security Program Reviews
 •   List Supply
 •   Media List
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 01, 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Top Ten IT Skills for 2014 by Global Knowledge

March 21, 2014 - (Free Research)
This brief resource lists the top ten IT skills and technologies that are going to be in demand in 2014. The IT world changes quickly, and understanding these skills and technologies will help IT professionals remain relevant. 
(WHITE PAPER) READ ABSTRACT |

Information Governance: Business Imperative or Technology Asset? by Iron Mountain

May 01, 2012 - (Free Research)
In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals. 
(EBRIEF) READ ABSTRACT |

Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

July 28, 2010 - (Free Research)
To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains. 
(WHITE PAPER) READ ABSTRACT |

5 Reasons to put ERM Tools on your GRC Shortlist by IBM

March 10, 2014 - (Free Research)
This expert guide provides a list of five must have capabilities required to support your GRC or ERM program. Read on and learn how you can keep your critical information safe. 
(EGUIDE) READ ABSTRACT |

Top benefits of compliant records management by Iron Mountain

March 15, 2012 - (Free Research)
When the world’s largest offshore drilling company wanted to lower the risks and costs associated with the increase of records management regulations, it sought out a qualified vendor to help create enterprise-wide compliant records management program.  Discover how this organization was able to significantly improve its records management. 
(WHITE PAPER) READ ABSTRACT |

Five Procurement Guidelines You Can't Afford to Ignore by StarCite

August 2008 - (Free Research)
Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination. 
(WHITE PAPER) READ ABSTRACT |

Business-Class Security and Compliance for On-Demand Instant Messaging by WebEx Communications, Inc.

December 2006 - (Free Research)
Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 17 April 2012: How to ensure smartphone security by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT. 
(EZINE) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Top 10 Security Checklist for SOHO Wireless LANs by Global Knowledge Network, Inc.

May 2005 - (Free Research)
Discover the ten simple steps SOHO users can take to secure their wireless networks. 
(WHITE PAPER) READ ABSTRACT |

Advanced Persistent Threats: Insider Credentials at Risk by NetIQ

December 2013 - (Free Research)
This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out. 
(WHITE PAPER) READ ABSTRACT |

Metro Atlanta YMCA Better Aligns its Mission, Member Engagement, and Marketing Communications Activities Using Birst by Birst

October 2009 - (Free Research)
In an attempt to tailor and more effectively promote its programs, the Metro Atlanta YMCA turned to Birst for a new set of Business intelligence (BI) tools. Birst delivered with features that included automated dashboards and adhoc reporting at a fair price. Read on to learn the benefits YMCA experienced when they switched to Birst. 
(CASE STUDY) READ ABSTRACT |

10 Hot Skills for 2009 by Global Knowledge

May 2009 - (Free Research)
With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond. 
(WHITE PAPER) READ ABSTRACT |

KnowledgeStorm Advertising Overview: Build Brand Awareness among Technology Buyers by KnowledgeStorm, Inc (E-mail this company)

June 2007 - (Free Research)
If you're looking to build awareness and consideration of your brand among technology buyers that rely on KnowledgeStorm, our advertising solutions will help you reach your target audience. 
(ANALYST REPORT) READ ABSTRACT |

Overcoming the Challenges of Green Procurement through eProcurement by Dimension Data Global

October 2008 - (Free Research)
This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Seven Email Marketing Refreshes by Bronto Software

October 2008 - (Free Research)
This whitepaper will detail seven key points that will help you quickly enhance your email-marketing program. You may also find some low hanging opportunities that you weren't aware you were missing. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 1 November 2011: Read this week's issue of the UK's leading technology publication, with the latest news, analysis and opinion for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we examine the IT challenges facing retailers in a world of multi-channel shopping; our latest Buyer's Guide looks at upgrading from Windows XP to Windows 7 as XP approaches the time Microsoft ceases support; and we kick-off this year's search for the most influential people in UK IT. Download the new issue now. 
(EZINE) READ ABSTRACT |

Understanding the New Open API Economy by TIBCO Software Inc.

December 2013 - (Free Research)
Open application programming interfaces (APIs) give partners and developers access to your business' data or functionality. Why would you want to use an open API? In this white paper, learn more about the business drivers of the open API economy, and learn what you should consider before deciding if open APIs are right for you. 
(WHITE PAPER) READ ABSTRACT |

Vital records: The 5% linked to compliance, operations, & enterprise survival by Iron Mountain

March 2012 - (Free Research)
This paper will help you discover what your vital records are through a list of questions you should ask yourself in determining which records fall into this category. You also will learn about the inherent risks associated with inadequate preservation and how to implement an effective and efficient vital records program for your organization. 
(WHITE PAPER) READ ABSTRACT |

SmartDL 4.0, Dynamic Group Management by Imanami

August 2006 - (Free Research)
Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution. 
(TRIAL SOFTWARE)

Virtualization Consulting Service Providers: Profiles by Dell, Inc. and Intel®

October 2009 - (Free Research)
This document provides a quick reference to understand the offerings and capabilities of nine service players in virtualization consulting services. This research can help you make informed decisions on your “long list” of providers for a virtualization program. 
(ANALYST REPORT) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

The Eight Truths of Social Learning. Now. by SkillSoft Corporation

June 2011 - (Free Research)
This paper seeks to uncover the fundamental requirements for a successful social learning program. Based on early experience with our own social learning tool, this list of eight “truths” has been compiled to provide a foundation for learning professionals who are launching social learning in their organizations. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts