National Security CasesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: National Security Cases returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Data Center Management
 •   Managed Security Services
 •   Application Security
 •   Intrusion Prevention Solutions

Related Searches
 •   Benefits Of National Security Cases
 •   Graphics National Security
 •   National New
 •   National Security Cases Planning
 •   National Security Cases Problem
 •   National Security Cases System Software
 •   National Security Tool
 •   Standard National
 •   Webcast National
 •   Work National Security Cases
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly – 11 March 2014: Making data flow freely by ComputerWeekly.com

March 11, 2014 - (Free Research)
In this week's Computer Weekly, our latest buyer's guide looks at open data and how it can improve public services – and even help prevent a repeat of the recent floods. We report from Cloud Expo on the reasons why public cloud is yet to be embraced by enterprise IT. And we look at the key issues for buying HR software in 2014. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 18 February 2014: Swapping notepads for iPads – creating a digital police force by ComputerWeekly.com

February 18, 2014 - (Free Research)
In this week's Computer Weekly, we examine the new digital strategy at the Metropolitan Police, as the London force puts technology at the heart of crime fighting. IBM is spending $1.2bn developing cloud datacentres – we assess the plans. And we ask how the NSA web surveillance revelations are affecting IT security strategies. Read the issue now. 
(EZINE) READ ABSTRACT |

Legal briefing: The Draft EU General Data Protection Regulation by ComputerWeekly.com

January 28, 2014 - (Free Research)
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: WWW - World Wide Weaponization by ESET

November 10, 2009 - (Free Research)
The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

WWW - World Wide Weaponization by ESET

October 22, 2009 - (Free Research)
The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(WEBCAST) READ ABSTRACT |

Business Information E-Zine: NoSQL Makes its Mark by SearchBusinessAnalytics

April 04, 2014 - (Free Research)
In this issue, we drill down on the facts of NoSQL databases, tapping into the experiences of savvy startups and other companies whose needs led them to NoSQL technologies. But is NoSQL right for you? Companies with fast-growing vaults of Web, social media, demographic and machine data should pay attention. IT experts chime in with timely advice. 
(EZINE) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 07, 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Cyber Crime Security in 2010 by eEye Digital Security

November 25, 2009 - (Free Research)
Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic. 
(WHITE PAPER) READ ABSTRACT |

Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks by Imperva

March 10, 2011 - (Free Research)
This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack. 
(WHITE PAPER) READ ABSTRACT |

Keep Your Hard Drive by Dell, Inc.

January 09, 2009 - (Free Research)
The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives. 
(DATA SHEET) READ ABSTRACT |

Taking the fear out of bringing Government Systems online by IBM

July 24, 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

NERC: What You Need to Know by SearchSecurity.com & SearchCompliance.com

October 16, 2009 - (Free Research)
The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC. 
(EBOOK) READ ABSTRACT |

VMworld Europe Case Study: The National Trust by ComputerWeekly.com

November 02, 2012 - (Free Research)
A virtualisation project has allowed the National Trust to reduce its carbon emissions and to drastically cut its IT energy bill. 
(CASE STUDY) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 02, 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by Attachmate Corporation

March 30, 2012 - (Free Research)
This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System by FireEye

May 10, 2011 - (Free Research)
This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.   
(CASE STUDY) READ ABSTRACT |

National Fibre Strategies by ComputerWeekly.com

June 07, 2013 - (Free Research)
Arthur D Little assess five strategic models for deploying national fibre optic telecommunications networks that have been implemented by countries around the globe. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 01, 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye

December 31, 2013 - (Free Research)
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends by ComputerWeekly.com

August 23, 2011 - (Free Research)
In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now. 
(EZINE) READ ABSTRACT |

Case Study: TORO National Support Network by NEC Corporation

August 05, 2009 - (Free Research)
Read this case study to learn how NEC solutions helped TORO improve contact-center service quality scores, improve staff productivity, improve business operations and enhance system flexibility. 
(CASE STUDY) READ ABSTRACT |

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks by Iron Mountain

December 31, 2012 - (Free Research)
This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services. 
(CASE STUDY) READ ABSTRACT |

First National Technology Solutions - Service provider expands target market with enhanced cloud infrastructure by EMC Corporation

November 11, 2011 - (Free Research)
In this case study, First National Technology Solutions' outdated infrastructure was modernized for company growth. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts