Making Security AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Making Security And returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Wireless Security
 •   Mobile Device Management
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management

Related Searches
 •   Filing Making Security
 •   Implement Making Security
 •   Making Accounting
 •   Making Manager
 •   Making Security And Alaska
 •   Making Security And Manage
 •   Making Security Canada
 •   Making Security System
 •   Plan Making
 •   Test Making Security
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 19, 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 13, 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Improving Identity and Access Management in an SAP Environment by Dell Software

May 06, 2010 - (Free Research)
In this new Quest white paper, see why splitting identity management work is not only frustrating, pointless and inefficient, but it’s also completely unnecessary. Learn how to easily manage your Active Directory and SAP environments, how to eliminate redundant work, and how automation makes security stronger and auditing simple. 
(WHITE PAPER) READ ABSTRACT |

Seagate NAS - What's Driving Data Security and Remote Access Inside by Seagate Technology

February 18, 2014 - (Free Research)
Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network. 
(WHITE PAPER) READ ABSTRACT |

SiteProtect and UltraDNS Solution: Double Your Protection by Neustar®

March 20, 2014 - (Free Research)
This exclusive paper examines a DNS solution that boasts fast DDoS mitigation responses, protecting both the DNS and HTTP layers so your site can withstand the most aggressive attacks. 
(WHITE PAPER) READ ABSTRACT |

Taking your enterprise mobile:  Executive checklist by Citrix

January 02, 2014 - (Free Research)
This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 03, 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Optimizing Storage For VDI Deployments by FalconStor Software

October 22, 2010 - (Free Research)
Virtual Desktop Infrastructure is poised to provide a new management and deployment model for end-user computing by centralizing the physical desktops to virtualized desktop farms in the data center. The resulting environment offers increased manageability, enhanced security and data protection. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Implementing a Secure Wireless Network in an Educational Setting by NETGEAR Inc.

October 11, 2010 - (Free Research)
Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more.  
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Developing A Successful Proof-of-Concept for a Virtual Desktop Pilot by Forsythe

December 07, 2009 - (Free Research)
Virtual desktops provide many consolidation opportunities, as well as some unique security and business continuity advantages. This transcript will give you an overview of desktop virtualization, highlight several virtual desktop solutions, and analyze the operational efficiency gains possible with desktop virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Agentless Backup—Separating Myth from Reality by Asigra

June 11, 2013 - (Free Research)
This white paper explores a backup solution that eliminates the requirement for locally installed agents, enabling substantial time and cost savings and simplified management. 
(WHITE PAPER) READ ABSTRACT |

RTDiscover by FaceTime Communications

December 10, 2007 - (Free Research)
The Internet has changed. Email and Web browsing traffic entering enterprise networks is now dwarfed by greynets like IM, VoIP and P2P, opening channels for potential malware coming in, as well as the danger of sensitive information leaking out 
(PRODUCT DEMO) READ ABSTRACT |

Adventist Health System Uses FalconStor® VTL with Deduplication by FalconStor Software

December 31, 2011 - (Free Research)
This one-page case study explores how one vendor's DR solution helped an organization reduce their backup window by more than 50%, shrink their duplicate data with an average deduplication ratio of 7:1 and maximize their efficiency through reporting and capacity planning capabilities. 
(CASE STUDY) READ ABSTRACT |

inStream Solutions launches with Confidence Thanks to Savvis Symphony VPDC by SAVVIS

June 11, 2013 - (Free Research)
Follow this case study to hear about the cloud strategy one organization deployed to improve their test and development environment with an advanced virtual private data center platform. 
(CASE STUDY) READ ABSTRACT |

Big Security for Big Data by Hewlett-Packard Company

December 31, 2012 - (Free Research)
This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best Practices to ensure secure mobile communication by Thawte Inc.

February 01, 2012 - (Free Research)
Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise. 
(EGUIDE) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 10, 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats by FireEye

December 2013 - (Free Research)
This guide explores 10 common mistakes businesses make when planning their security strategy. 
(WHITE PAPER) READ ABSTRACT |

How to Make Virtual Desktop Security Simpler and More Scalable by Citrix

April 2011 - (Free Research)
It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users. 
(WEBCAST) READ ABSTRACT |

WEP Cloaking for Legacy Encryption Protection by Motorola, Inc.

November 2008 - (Free Research)
Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution. 
(ANALYST REPORT) READ ABSTRACT |

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC

August 2010 - (Free Research)
In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security. 
(WHITE PAPER) READ ABSTRACT |

Security Bloopers: Five Common Mistakes by Cisco Systems, Inc.

February 2009 - (Free Research)
IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts