Logical Security Policies ProviderWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Logical Security Policies Provider returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Security Monitoring
 •   Application Security
 •   Identity Management/ User Provisioning
 •   Enterprise Data Protection and Privacy
 •   Access Control
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Managed Security Services
 •   Endpoint Security

Related Searches
 •   Diagram Logical Security Policies
 •   Example Logical Security
 •   Logical Automation
 •   Logical International
 •   Logical Portals
 •   Logical Security Policies Wireless
 •   Logical Security Schema
 •   Practices Logical
 •   Server Logical Security
 •   Specialist Logical
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Security Essentials for CIOs by IBM

March 14, 2013 - (Free Research)
Read this whitepaper and learn five important steps to consider when embarking on a BYOD program - steps that will make BYOD use a reality by seamlessly securing corporate data and applications on the device while providing a logical separation from personal activities and data. 
(WHITE PAPER) READ ABSTRACT |

Simplifying the Scope of the PCI Audit: How Cross-Platform Server Isolation Helps Retailers Achieve Compliance by Apani

February 2008 - (Free Research)
This paper will describe how Apani EpiForce can solve key aspects of the PCI compliance challenge. Apani® EpiForce® proactively eliminates vulnerabilities within the corporate network by isolating computers and the business-critical data, personal information and intellectual property stored on them into logical security zones. 
(ARTICLE) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Establishing a Logical Perimeter: The Evolution of Network Security by Palo Alto Networks

March 2014 - (Free Research)
This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Security User Compliance Management Demo by IBM

December 2008 - (Free Research)
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information. 
(DEMO)

Beyond Disaster Recovery: Becoming a Resilient Business Organization by IBM Software Group

June 2008 - (Free Research)
Discover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster. 
(WHITE PAPER) READ ABSTRACT |

Security and High Availability in Cloud Computing Environments by IBM

July 2011 - (Free Research)
Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Take a look at this exclusive resource to learn how adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Are your applications cloud-ready? by IBM

November 2011 - (Free Research)
This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Managing data and application security risks cost effectively by IBM

October 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Oracle Identity Analytics- A Business Perspective by Oracle Corporation

February 2010 - (Free Research)
This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals. 
(WHITE PAPER) READ ABSTRACT |

Alegent Health Implements Courion Solutions to Deliver Access Assurance by Courion Corporation

December 2009 - (Free Research)
This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained. 
(CASE STUDY) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

Building an Infrastructure That Enables Log Management Best Practices by RSA, The Security Division of EMC

February 2008 - (Free Research)
This paper takes the next logical step by guiding organizations in establishing the criteria for an infrastructure to help realize best practices and build a technology strategy for comprehensive security information and event management. 
(WHITE PAPER) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Take a Holistic Approach to Business Driven Security by IBM

December 2008 - (Free Research)
Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success. 
(WHITE PAPER)

A Guide to Evaluating Email Security Solutions by SonicWALL

April 2008 - (Free Research)
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions. 
(WHITE PAPER) READ ABSTRACT |

Enabling Sustainable Compliance Management by IBM

December 2008 - (Free Research)
Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals. 
(WHITE PAPER) READ ABSTRACT |

10 Cool Things Your Firewall Should Do by SonicWALL

November 2008 - (Free Research)
This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall. 
(WHITE PAPER) READ ABSTRACT |

Securing End-User Mobile Devices in the Enterprise by IBM

August 2011 - (Free Research)
As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization. 
(WHITE PAPER) READ ABSTRACT |

ER/Studio 7.5 by Embarcadero Technologies, Inc.

March 2008 - (Free Research)
Embarcadero® ER/Studio®, an industry-leading data modeling tool, helps companies discover, document, and re-use data assets while providing intuitive reverse engineering, logical modeling, and physical modeling. 
(DEMO) READ ABSTRACT |

Compliance and Risk Management: Factoring compliance as part of your risk management equation by IBM

November 2011 - (Free Research)
Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more. 
(EBOOK) READ ABSTRACT |

Data Security and Privacy: A Holistic Approach by IBM

September 2011 - (Free Research)
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk. 
(WHITE PAPER) READ ABSTRACT |

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts