Methodology Security TechnologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Methodology Security Technology returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Data Center Management
 •   Security Policies
 •   Business Intelligence Solutions
 •   Network Security
 •   Business Process Management (BPM)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management

Related Searches
 •   Email Methodology
 •   Improve Methodology Security
 •   Methodology Electronic
 •   Methodology Security Screen
 •   Methodology Security Technology Records
 •   Methodology Security Technology Small
 •   Proposals Methodology Security
 •   Statement Methodology Security
 •   Technical Methodology Security
 •   Tool Methodology Security
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 25, 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 11, 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 25, 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and Backup: Advances in Technology and Lessons Learned by Early Adopters – Presentation Transcript by EqualLogic, Inc.

March 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz traces the role of backup in virtual environments, starting with the early adopters and moving to today's top backup methodologies. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and backup: Technology advances and lessons learned by early adopters by EqualLogic, Inc.

February 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz traces the role of backup in virtual environments, starting with the early adopters and moving to today's top backup methodologies. 
(WEBCAST) READ ABSTRACT |

Implementing Oracle on VMware vSphere: New Technology, New Thinking and Great Results by VMware, Inc.

March 2014 - (Free Research)
In this webcast takes a fresh look at best practices for implementing Oracle databases and applications on the VMware vSphere platform. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: The Practical Implementation of BPM & SOA, Part II by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes. Discussed here is methodology, best practices and experiences. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You by Aladdin Knowledge Systems

August 2008 - (Free Research)
This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security by Faronics

January 2010 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How Application Whitelisting Can Increase Your Desktop Security by Faronics

November 2009 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus. 
(WEBCAST) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

EMC Virtual Infrastructure Data Protection by EMC Corporation

EMC Virtual Infrastructure Data Protection solutions guard your virtual infrastructure applications and data from downtime and provide the availability you expect for critical workloads. It combins backup and recovery technologies with VMware server virtualization. 
(SOFTWARE PRODUCT)

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Merging Backup and Disaster Recovery (DR) Processes by FalconStor Software

April 2011 - (Free Research)
This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments. 
(WHITE PAPER) READ ABSTRACT |

SOA and BPM: A Process Centric Approach - Part 1 Background and Basic by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes - discussed here as Service-Oriented Computing (SOC) as a way of gaining a better view on SOA in relation to BPM. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly 11 October 2011: Download this week's issue of the UK's leading technology publication, featuring the latest news, analysis and opinion on the big trends in IT by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we find out how mainframe technology that was meant to be dead and buried is finding innovative new applications. We analyse the challenges facing the government's largest deployment of agile software development, and our Buyer's Guide highlights the firms making the most of social media. Download the new issue now. 
(EZINE) READ ABSTRACT |

Network Barometer Report 2011 by Dimension Data

June 2011 - (Free Research)
This report reviews the networks’ readiness to support business by evaluating the configuration variance from best practices, potential security vulnerabilities and end-of-life status of the included network devices. 
(ANALYST REPORT) READ ABSTRACT |

BYOD: Policy Creation and it's Increasingly Growing Need by Citrix

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy. 
(EGUIDE) READ ABSTRACT |

Monitoring Physical Threats in the Data Center by APC by Schneider Electric

February 2009 - (Free Research)
This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime. 
(WHITE PAPER) READ ABSTRACT |

HP Business Service Management by Hewlett-Packard Company

February 2011 - (Free Research)
HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business. 
(WEBCAST) READ ABSTRACT |

Storage Through the Looking Glass by ComputerWeekly.com

April 2013 - (Free Research)
This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective. 
(ANALYST REPORT) READ ABSTRACT |

Primary Storage Optimization: An Overview by IBM Real-time Compression

October 2010 - (Free Research)
This paper provides an overview of the different approaches to primary storage capacity savings—highlighting storage capacity optimization methodologies and primary storage technologies, deployments and performance considerations. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Contact Centers for Dummies by Avaya Inc.

November 2008 - (Free Research)
This guide provides a high-level approach to the different methodologies with lots of information not only on running contact centers, but also on implementing technology in contact centers in a profitable way. 
(WHITE PAPER) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts