Managers Nsa SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Managers Nsa Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Application Management and Maintenance
 •   Security Monitoring
 •   Application Security
 •   Firewalls
 •   Vulnerability Assessment

Related Searches
 •   Linux Managers
 •   Managers Contract
 •   Managers New
 •   Managers Nsa Administration
 •   Managers Nsa Conference
 •   Managers Nsa Metrics
 •   Notes About Managers
 •   Project Managers
 •   Record Managers
 •   Resources Managers Nsa Security
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration by IntraLinks, Inc

April 17, 2014 - (Free Research)
This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation Firewall by SonicWALL

February 28, 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked. 
(WHITE PAPER) READ ABSTRACT |

NSA Series data sheet by Dell Software

June 30, 2013 - (Free Research)
Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 17, 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Intelligent real-time protection and application control by SonicWALL

March 17, 2011 - (Free Research)
It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network. 
(WHITE PAPER) READ ABSTRACT |

Legal briefing: The Draft EU General Data Protection Regulation by ComputerWeekly.com

January 28, 2014 - (Free Research)
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

BGMX Retail Solutions Case Study by SonicWALL

February 14, 2011 - (Free Research)
BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines. 
(CASE STUDY) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Who’s Snooping on Your Email? by Sophos, Inc.

December 17, 2013 - (Free Research)
This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption. 
(WHITE PAPER) READ ABSTRACT |

Top Reasons To Choose Red Hat Enterprise Linux by Red Hat and Intel

August 10, 2009 - (Free Research)
You probably already know that some of the largest and most demanding companies trust Red Hat to drive the IT infrastructure behind their successful businesses. This whitepaper will list and discuss the top reasons you should choose Red Hat Enterprise Linux to power the demanding applications you rely on to run your company. 
(WHITE PAPER) READ ABSTRACT |

Clean VPN Approach to Secure Remote Access by SonicWALL

June 2008 - (Free Research)
In this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security. 
(WHITE PAPER) READ ABSTRACT |

Encryption Key Management: A Technical White Paper by Quantum Corporation

October 2007 - (Free Research)
Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity. 
(WHITE PAPER) READ ABSTRACT |

Encryption Key Management: A Technical White Paper by Quantum Corporation

October 2007 - (Free Research)
Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company by Oracle Corporation

December 2010 - (Free Research)
This e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data. 
(EBOOK)

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by SonicWALL

April 2008 - (Free Research)
Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Simplify Compliance and Security with Novell® Sentinel™ Log Manager by Novell, Inc.

March 2011 - (Free Research)
Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Understanding Risk: An Opportunity for IT Managers by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Sentinel Log Manager Review by Novell, Inc.

July 2010 - (Free Research)
This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities. 
(WHITE PAPER) READ ABSTRACT |

SOA Security: Oracle Web Services Manager by Oracle Corporation

May 2009 - (Free Research)
Companies worldwide are actively implementing service-oriented architectures (SOA), both in intranet and extranet environments. While SOA offers many advantages over current alternatives, deploying networks of web services still presents key challenges...this paper showcases how Oracle's Web Services Manager (WSM) addresses these challenges. 
(DATA SHEET) READ ABSTRACT |

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall by Riverbed Technology, Inc.

January 2012 - (Free Research)
PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6. 
(WHITE PAPER) READ ABSTRACT |

WEALTH MANAGER'S TAKE ON OUTSOURCING by Wipro Technologies

February 2008 - (Free Research)
Wealth managers can ensure success of outsourcing relationships by ensuring a stringent service provider selection program based on service providers' processes, quality standards, cost efficiency and knowledge. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts