Managing Security In TandbergWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Managing Security In Tandberg returned the following results.
RSS What is RSS?
Related Categories

 •   Managed Security Services
 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Wireless Security
 •   Managed Service Provider (MSP)
 •   Security Policies

Related Searches
 •   Make Managing
 •   Managing Agency
 •   Managing Layout
 •   Managing Security Contact
 •   Managing Security In Batch
 •   Managing Security In Developments
 •   Managing Security In Web Cast
 •   Managing Security Systems
 •   Researching Managing
 •   Web Casts Managing
Advertisement

ALL RESULTS
1 - 25 of 453 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

10 Tips for Managing Security in the Cloud by Dell, Inc. and Intel®

November 23, 2011 - (Free Research)
With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Why Data Protection Law Supports the Use of Managed Security Services by Dell SecureWorks UK

August 31, 2013 - (Free Research)
This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws. 
(WHITE PAPER) READ ABSTRACT |

Security Services: Security Information Management (SIM) Solutions by Dell SecureWorks UK

March 24, 2011 - (Free Research)
The intent of this paper is to provide an executive-level summary of the potential costs associated with managing information security in-house and highlights the advantages of using a Managed Security Services Provider (MSSP) to reduce costs and improve the quality of protection. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

How to Overcome Security Skills Deficiencies by IBM

May 31, 2013 - (Free Research)
This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 10, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 10, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Managing Security on Mobile Phones by Nokia

January 11, 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

Taking Managed Security Services To The Next Level by Webroot

October 31, 2013 - (Free Research)
This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 31, 2014 - (Free Research)
This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 31, 2014 - (Free Research)
This informative whitepaper takes a look current threat landscape and what you need to do to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Global Business Gets Continuous Worldwide Network Protection by Dell SecureWorks UK

May 31, 2012 - (Free Research)
In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data by IBM

July 24, 2013 - (Free Research)
IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 31, 2014 - (Free Research)
This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment. 
(WHITE PAPER) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 01, 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

On the Safe Side: Managing Security in Mobile Apps by TechTarget

February 19, 2014 - (Free Research)
Software development projects aren't always on top of the security management list, but when it comes to enterprise mobility applications, there's no question about its precedence. Take this survey to gain access to an e-book that highlights 7 tips to protect enterprise data and how to avoid the perpetual cycle of insecurity. 
(RESOURCE)

Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT by IBM

December 01, 2010 - (Free Research)
This paper explains how clients can balance risk and innovation through the use of services from IBM. 
(WHITE PAPER) READ ABSTRACT |

Simplifying Network Security with a Single Source Provider by Perimeter eSecurity

December 2008 - (Free Research)
Read this whitepaper for a look at how, if done properly, reducing the number of security vendors or only selecting one vendor for multiple services is a great way for organizations to manage costs, obtain needed expertise, and expand security services. 
(WHITE PAPER) READ ABSTRACT |

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner by Perimeter eSecurity

November 2011 - (Free Research)
Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine - March 2013 by SearchSecurity.com

March 2013 - (Free Research)
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more. 
(EZINE) READ ABSTRACT |

Report: Cyber Security Attack and Incident Data by IBM

March 2013 - (Free Research)
Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients. 
(WHITE PAPER) READ ABSTRACT |

Case Study: GoldenTree Asset Management by ESET

October 2010 - (Free Research)
In this case study you’ll learn how one London finance company did the following: found malware other AV products weren’t finding; secured the environment; witnessing virus protection doing what it is designed to do. Read on to learn so much more. 
(CASE STUDY) READ ABSTRACT |

Simplifying management and lowering total cost of ownership for SSL certificates by GlobalSign

May 2011 - (Free Research)
This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine by SearchSecurity.com

October 2013 - (Free Research)
Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change. 
(EZINE) READ ABSTRACT |

1 - 25 of 453 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts