Measure Check Secure DocumentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measure Check Secure Document returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Application Security
 •   Endpoint Security
 •   Virtualization
 •   Wireless Security
 •   Security Monitoring
 •   Vulnerability Assessment

Related Searches
 •   Designing Measure
 •   Measure Calls
 •   Measure Check Consulting
 •   Measure Check Demand
 •   Measure Check Requirement
 •   Measure Check Secure Migration
 •   Measure Check Secure Repairs
 •   Measure Definitions
 •   Monitoring Measure Check Secure
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong by SearchSecurity.co.UK

December 2008 - (Free Research)
Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges. 
(EBOOK) READ ABSTRACT |

Security intelligence is the smart way to keep the cloud safe by IBM

October 2013 - (Free Research)
This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs. 
(WHITE PAPER) READ ABSTRACT |

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by Sophos, Inc.

June 2009 - (Free Research)
Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption. 
(WHITE PAPER) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

Top Tips on How to Avoid Losing Your Life If You Lose Your Phone at the Christmas Bash by Dell, Inc.

March 2014 - (Free Research)
Vital information is almost always stored on smartphones, but security measures are rarely taken. This brief resource gives the top twelve tips on making sure vital information is secure in case a smartphone is lost or stolen. 
(WHITE PAPER) READ ABSTRACT |

Secure Smartphone Apps: The Next Generation by BlackBerry

April 2010 - (Free Research)
The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take. 
(WHITE PAPER) READ ABSTRACT |

SANS Institute: Oracle Database Security, What to Look for and Where to Secure by Oracle Corporation

June 2010 - (Free Research)
To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out. 
(WHITE PAPER) READ ABSTRACT |

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

CW+: How to build, secure, manage and measure IT workloads by ComputerWeekly.com

January 2011 - (Free Research)
Computing infrastructure today is highly versatile and this has many benefits for businesses. Unfortunately, it also has downsides; use that infrastructure unintelligently and costs can get out of control. 
(WHITE PAPER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Securing the Administration of Virtualization by RSA, The Security Division of EMC

March 2010 - (Free Research)
In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization. 
(ANALYST REPORT) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Fundamental Principles of Network Security by APC by Schneider Electric

July 2009 - (Free Research)
This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols. 
(WHITE PAPER) READ ABSTRACT |

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by Core Security Technologies

October 2013 - (Free Research)
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content. 
(WHITE PAPER) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

The State of Cloud Storage by Nasuni Corporation

October 2013 - (Free Research)
Check out this informative paper to explore the current state of cloud storage. Discover a benchmark comparison of today's top cloud storage solutions and explore one vendor's offering that stands out from the rest. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

DNS in the Cloud: Building a Secure DNS Architecture by F5 Networks

January 2014 - (Free Research)
Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones. 
(EGUIDE) READ ABSTRACT |

Key Steps to Securing Your Organization and Evicting a Hacker by Foundstone, Inc.

May 2008 - (Free Research)
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks. 
(PODCAST) READ ABSTRACT |

MDM features vs. native mobile security by Websense, Inc.

April 2012 - (Free Research)
When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each. 
(EGUIDE) READ ABSTRACT |

Three Must-Have’s to Securing the Social Web by Websense, Inc.

July 2011 - (Free Research)
Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Antivirus Security: How Does Your Solution Stack Up? by Webroot

March 2012 - (Free Research)
Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date. 
(WHITE PAPER) READ ABSTRACT |

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.

February 2008 - (Free Research)
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more. 
(WHITE PAPER) READ ABSTRACT |

Cloud Readiness Flight-Check by EMC Corporation

October 2013 - (Free Research)
This short but in-depth quiz evaluates cloud readiness in four major categories: Strategy, infrastructure, applications, and processes. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts