Make SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Make Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Endpoint Security
 •   Authentication / Password Management
 •   Wireless Security
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Communication Make Security
 •   Computer Make Security
 •   Contact Make Security
 •   Databases Make Security
 •   Firms Make Security
 •   Layout Make
 •   Make New Jersey
 •   Make Security Infrastructure
 •   Make Security Office
 •   Statement Make Security
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 13, 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Improving Identity and Access Management in an SAP Environment by Dell Software

May 06, 2010 - (Free Research)
In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple. 
(WHITE PAPER) READ ABSTRACT |

SiteProtect and UltraDNS Solution: Double Your Protection by Neustar®

March 20, 2014 - (Free Research)
This exclusive paper examines a DNS solution that boasts fast DDoS mitigation responses, protecting both the DNS and HTTP layers so your site can withstand the most aggressive attacks. 
(WHITE PAPER) READ ABSTRACT |

Taking your enterprise mobile:  Executive checklist by Citrix

January 02, 2014 - (Free Research)
This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 19, 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Big Security for Big Data by Hewlett-Packard Company

December 31, 2012 - (Free Research)
This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 10, 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

The Intersection of SAM and Security by CDW Corporation

March 2014 - (Free Research)
This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex. 
(WHITE PAPER) READ ABSTRACT |

The Benefits of an Integrated Approach to Security in the Cloud by IBM

December 2013 - (Free Research)
This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM. 
(WHITE PAPER) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Securing  Android, iOS and Windows Tablets and Smartphones by Citrix

March 2014 - (Free Research)
This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience. 
(WHITE PAPER) READ ABSTRACT |

Top Tips on How to Avoid Losing Your Life If You Lose Your Phone at the Christmas Bash by Dell, Inc.

March 2014 - (Free Research)
Vital information is almost always stored on smartphones, but security measures are rarely taken. This brief resource gives the top twelve tips on making sure vital information is secure in case a smartphone is lost or stolen. 
(WHITE PAPER) READ ABSTRACT |

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls by Cisco (E-mail this company)

May 2013 - (Free Research)
This whitepaper details the trouble modern firewalls have with protecting your data from modern threats and offers a next-generation solution for your organization. 
(WHITE PAPER) READ ABSTRACT |

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats by FireEye

December 2013 - (Free Research)
This guide explores 10 common mistakes businesses make when planning their security strategy. 
(WHITE PAPER) READ ABSTRACT |

Firewall Buyers Guide for Evaluating Enterprise Network Firewalls by Palo Alto Networks

December 2013 - (Free Research)
In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs. 
(WHITE PAPER) READ ABSTRACT |

Big Data and Content Analytics: measuring the ROI by ComputerWeekly.com

December 2013 - (Free Research)
Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to Make Virtual Desktop Security Simpler and More Scalable by Citrix

April 2011 - (Free Research)
It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users. 
(WEBCAST) READ ABSTRACT |

WEP Cloaking for Legacy Encryption Protection by Motorola, Inc.

November 2008 - (Free Research)
Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution. 
(ANALYST REPORT) READ ABSTRACT |

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC

August 2010 - (Free Research)
In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security. 
(WHITE PAPER) READ ABSTRACT |

Security Bloopers: Five Common Mistakes by Cisco Systems, Inc.

February 2009 - (Free Research)
IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network. 
(WHITE PAPER) READ ABSTRACT |

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense by Symantec Corporation

February 2013 - (Free Research)
BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs. 
(EGUIDE) READ ABSTRACT |

Web Browser Security Features Make Attacks Harder by Symantec Corporation

February 2013 - (Free Research)
In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

HP Business Service Management by Hewlett-Packard Company

February 2011 - (Free Research)
HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts