Manuals Call Government SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Manuals Call Government Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Business Process Management (BPM)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Testing and Analysis
 •   Authentication / Password Management
 •   Security Monitoring

Related Searches
 •   Buying Manuals Call Government
 •   Industry Manuals
 •   Manuals Call Government Template
 •   Manuals Linux
 •   Manuals Make
 •   Manuals Operating
 •   Manuals Search
 •   Markets Manuals Call
 •   Multi Manuals
 •   Quality Manuals Call
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Government Security by SearchSecurity.com

May 2011 - (Free Research)
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats. 
(EGUIDE) READ ABSTRACT |

U.S. Army Relies on Globalscape® to Protect Critical Data by GlobalScape

December 2013 - (Free Research)
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS). 
(CASE STUDY) READ ABSTRACT |

Solving Security Challenges for Government Cloud-Based IT Environments by Red Hat

December 2011 - (Free Research)
Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits. 
(WHITE PAPER) READ ABSTRACT |

AGESIC (Uraguay) by IBM

June 2011 - (Free Research)
Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management. 
(CASE STUDY) READ ABSTRACT |

Healthcare 2015: Win-win or Lose-lose? by IBM Line of Business

June 2006 - (Free Research)
There is a more positive scenario - a "win-win" - but it is one that will require new levels of accountability, tough decisions and hard work on the part of all stakeholders. 
(WHITE PAPER)

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation by IBM

October 2013 - (Free Research)
Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks. 
(WHITE PAPER) READ ABSTRACT |

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks by FireEye

December 2013 - (Free Research)
This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: State of New York Government Case Study by McAfee, Inc.

October 2009 - (Free Research)
Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Lifecycle of an Advanced Persistent Threat by Dell SecureWorks UK

August 2012 - (Free Research)
Advanced Persistent Threats (APTs) are a serious concern for both governmental and private-sector organizations. Read this white paper to get the situational awareness and understanding you'll need to develop an effective and efficient Advanced Persistent Threat (APT) defense strategy. 
(WHITE PAPER) READ ABSTRACT |

TMA Resources Increases Customer Satisfaction Rates by Four Times with Parature Customer Service™ Software by Parature, Inc.

August 2008 - (Free Research)
In this case study, TMA needed to streamline and automate its manual customer service process to reduce resolution times and improve satisfaction. Learn how Parature Customer Service software reduced time on manual administrative activities by 25%. 
(CASE STUDY) READ ABSTRACT |

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation by IBM

December 2013 - (Free Research)
This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Open Grid Europe is open to new approaches for IT training by Hewlett-Packard Limited

November 2012 - (Free Research)
In this brief case study, learn how Open Grid Europe leveraged e-learning software that enabled rapid and flexible creation of electronic, interactive manuals and software documentation for their employees. Discover the benefits Open Grid experiences thanks to this e-learning program and their new ALM software by reading now. 
(CASE STUDY) READ ABSTRACT |

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World by Black Duck Software

July 2008 - (Free Research)
Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Government Agencies by IBM

March 2013 - (Free Research)
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

What is Intel Core vPro Technology by Intel

June 2012 - (Free Research)
This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states. 
(VIDEO) READ ABSTRACT |

Increasing the efficiency of case file coordination in social services by IBM

June 2011 - (Free Research)
Social service agencies are experiencing challenges with manual processes. Advanced case management strategies are being implemented to streamline these processes and foster greater insight, collaboration and decision-making capabilities. This white paper explains how one such solution allows you automate these processes to elevate processing. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Resolving Business-Critical Application Problems by BMC Software, Extending Value with Identify Software

April 2008 - (Free Research)
This white paper details the challenges of application problem resolution, highlighting the best practices necessary to automate and accelerate the process as a means to optimize development. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Lights Out in a Citrix Environment by CCSS

March 2012 - (Free Research)
Access this essential resource to discover how QMessage Monitor, a message monitoring system, helped one organization complete critical processing tasks on time, eliminating the need for manual monitoring and avoiding costly downtime. 
(WHITE PAPER) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts