Lists Information Designing SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Lists Information Designing Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Security Monitoring
 •   Intrusion Prevention Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Backup Systems and Services
 •   Storage Management
 •   Storage Security

Related Searches
 •   Cycles Lists Information Designing
 •   Graphs Lists Information Designing
 •   Issues Lists Information Designing
 •   Lists Customer
 •   Lists Information Designing Training
 •   Lists Information National
 •   Lists Tutorials
 •   Maintenance Lists Information Designing
 •   Performance Lists Information Designing
 •   Test Lists Information
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Security visualisation by ComputerWeekly.com

January 18, 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 18, 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

Power and Cooling Capacity Management for Data Centers by Schneider Electric

October 08, 2013 - (Free Research)
This white paper details how to deal with high density IT equipment in your data center. 
(WHITE PAPER) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

Secure Unified Access with Cisco Catalyst 2960-X and 2960-XR Series Switches by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This informative whitepaper explores the security benefits of an industry leader's networking switch technology. 
(WHITE PAPER) READ ABSTRACT |

SmartDL 4.0, Dynamic Group Management by Imanami

August 01, 2006 - (Free Research)
Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution. 
(TRIAL SOFTWARE)

WAN Optimization in MPLS Networks - The Transparency Challenge by Expand Networks

March 2008 - (Free Research)
Today's modern Wide Area Networks (WANs), such as MPLS networks, provide much more than just a framework for information transport. 
(WHITE PAPER) READ ABSTRACT |

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise by Tripwire, Inc.

February 2011 - (Free Research)
Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure. 
(DATA SHEET) READ ABSTRACT |

10 Cloud Storage Requirements from Marc Staimer by IBM

December 2011 - (Free Research)
This E-Guide was designed to get the facts straight on cloud as it defines cloud storage and lists Chief Dragon Slayer of Dragon Slayer Consulting, Marc Staimer’s top cloud storage requirements. Also in this guide – discussion around the recent cloud washing phenomenon created by marketers and vendors. 
(EGUIDE) READ ABSTRACT |

Take Advantage of Oracle's 2 Day DBA Course by Oracle Corporation

February 2009 - (Free Research)
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions. 
(TRAINING GUIDE) READ ABSTRACT |

MarketScope for E-Discovery Software Product Vendors by Clearwell Systems

December 2009 - (Free Research)
Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Skills in Demand in 2010 by Global Knowledge

January 2010 - (Free Research)
In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at that end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" Here's the complete list, with the No. 1 skill listed being in the highest demand. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 27 November 2012: Announcing the most influential people in UK IT by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 13 December 2011: Read this week’s special issue announcing the UKtech50 – the 50 most influential people in UK IT. by ComputerWeekly.com

December 2011 - (Free Research)
In this week's special issue of Computer Weekly, we reveal the UKtech50 - our list of the 50 most influential people in UK IT. This year's winner is Mike Lynch, CEO of Autonomy, who talks in an exclusive interview about his hopes for the UK technology industry, and life at HP since the company's 7bn GBP acquisition. Download the new issue now. 
(EZINE) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Compliance and Mobile Computing by Intermec

March 2008 - (Free Research)
The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment. 
(WHITE PAPER) READ ABSTRACT |

Mainframe Server Consolidation Should be on Your Hit List by CA Technologies.

March 2013 - (Free Research)
This expert e-guide explains why mainframe server consolidation should be a top priority because it not only yields reduced costs, it allows for improved robustness, scalability, and capacity flexibility. 
(WHITE PAPER) READ ABSTRACT |

Information Security IT Decision Checklist: Security Information and Event Management by ArcSight, an HP Company

July 2011 - (Free Research)
This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process. 
(EGUIDE) READ ABSTRACT |

New Data Center Designs Go Underground for Energy Efficiency by Iron Mountain

January 2014 - (Free Research)
This resource introduces a service that's changing the data center colocation model by delivering the key capabilities and functions you need to align your data center infrastructure with disaster recovery requirements and fuel success. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Choosing enterprise wireless LAN equipment by NETGEAR Inc.

March 2011 - (Free Research)
802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements. 
(EGUIDE) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Information Governance: Business Imperative or Technology Asset? by Iron Mountain

May 2012 - (Free Research)
In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals. 
(EBRIEF) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts