Measures Security ItWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measures Security It returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Data Center Management
 •   Wireless Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Managed Security Services

Related Searches
 •   Corporation Measures
 •   Do Measures
 •   Guideline Measures Security It
 •   Measures Risk
 •   Measures Security It Manage
 •   Measures Security It Measured
 •   Measures Security It Profile
 •   Measures Security Types
 •   Need Measures Security It
 •   Specialist Measures
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Multi-Step Authentication and Why You Should Use It by Global Knowledge

August 08, 2013 - (Free Research)
Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security. 
(WHITE PAPER) READ ABSTRACT |

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud by Mimecast

August 17, 2010 - (Free Research)
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Data Center Facilities IT Handbook, Ch 4 - Data Center Design and Build Out by Dell, Inc. and Intel®

August 10, 2009 - (Free Research)
A successful data center construction or renovation project requires managers to carefully follow each phase of the process - design, construction, review and acceptance. Read this eBook Chapter to learn more. 
(EBOOK) READ ABSTRACT |

10 Tips for Managing Security in the Cloud by Dell, Inc. and Intel®

November 23, 2011 - (Free Research)
With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Server Virtualization: Top 3 Things to Know Before you Start by Dell, Inc. and Intel®

July 25, 2013 - (Free Research)
This exclusive resource details three things you must know before you virtualize your servers. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Security with Intel® Trusted Execution Technology by Dell, Inc. and Intel®

August 29, 2013 - (Free Research)
This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more! 
(VIDEO) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 20, 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

HP Business Service Management by Hewlett-Packard Company

February 04, 2011 - (Free Research)
HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business. 
(WEBCAST) READ ABSTRACT |

Citizen Machinery Achieves Real Time Asset Management Accuracy with Hitachi IT Operations Director by Hitachi Data Systems

May 27, 2011 - (Free Research)
In this case study, Citizen Machinery Co. was challenged with improving efficiency in its IT asset management and Hitachi helped to address the issue with Hitachi IT Operations Director, which has contributed to the strengthening of both IT controls and security measures. 
(WHITE PAPER) READ ABSTRACT |

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements by Oracle Corporation

January 31, 2012 - (Free Research)
Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy. 
(WHITE PAPER)

How to tackle risk taxonomy by ComputerWeekly.com

November 25, 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 12, 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Three Must-Have Security Measures to Empower Data Centre Transformation by Cisco (E-mail this company)

July 31, 2013 - (Free Research)
As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning. 
(WHITE PAPER)

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 03, 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM's Approach to Advanced Persistent Threats by IBM

August 02, 2012 - (Free Research)
Access this video to learn more about advanced persistent threats (APTs) and how to address them. Topics covered the nature of APTs, preventative measures to take, and how professionals are addressing this challenge. 
(VIDEO) READ ABSTRACT |

MDM features vs. native mobile security by SearchSecurity.com

April 20, 2012 - (Free Research)
When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each. 
(EGUIDE) READ ABSTRACT |

Workday Security: A Technology Perspective by Workday

October 2008 - (Free Research)
Workday uses industry-standard measures to protect the integrity of all communications with its online services, its production network, and across its network. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by Core Security Technologies

October 2013 - (Free Research)
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content. 
(WHITE PAPER) READ ABSTRACT |

 Five tips to reduce risk from modern web threats by Sophos, Inc.

October 2010 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

Optimizing Virtualization Success with Facts and Transparency by BDNA

April 2008 - (Free Research)
Virtualization initiatives can struggle without transparency into the complex IT environment. By establishing a trusted fact base of IT assets, both physical and virtual, IT can measure and manage virtualization initiatives. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Avoiding Application Security Pitfalls by IBM

January 2011 - (Free Research)
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts