New Corporate SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: New Corporate Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Security Monitoring
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Application Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Check New Corporate Security
 •   Imports New Corporate Security
 •   Learn About New Corporate Security
 •   New Benefits
 •   New Corporate Configurations
 •   New Corporate Security Strategy
 •   New Function
 •   New Michigan
 •   New Package
 •   Rfq New Corporate Security
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication by i365, makers of Evault

June 30, 2009 - (Free Research)
Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers. 
(CASE STUDY) READ ABSTRACT |

June Issue of Information Security magazine: Mobile Security: A New Game Plan by Information Security Magazine

June 02, 2011 - (Free Research)
This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges. 
(EZINE)

HP OpenCall Media Platform: A Cost-effective, Agile IP Media Server by Hewlett-Packard Company

September 01, 2009 - (Free Research)
Mobile communication technologies are evolving quickly and new customer demands arise almost every day. At the same time, the economic downturn has impacted budgets, so that cost efficiency now tops the corporate agenda. Service providers must now must not only test and develop new services to meet customer demand, but do it within tight budgets. 
(WHITE PAPER) READ ABSTRACT |

Battling Modern Botnets by FireEye

April 28, 2008 - (Free Research)
The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not. 
(WHITE PAPER) READ ABSTRACT |

Citrix and Intel Deliver Client Virtualization by Citrix

June 09, 2010 - (Free Research)
Citrix and Intel worked together to deliver local virtual machine desktops, aiming to make virtualization ubiquitous on client devices. The result of the collaboration is Citrix® XenClient™, a local desktop virtualization platform that provides new levels of security and user flexibility for enterprise desktops. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 12, 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

Keeping Networks safe from Social Networking by BlueCoat

November 21, 2011 - (Free Research)
Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking. 
(EGUIDE) READ ABSTRACT |

PC on a Stick: A Portable Endpoint Security Nightmare by Lumension

January 01, 2007 - (Free Research)
Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns. 
(WHITE PAPER) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 24, 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

July 27, 2010 - (Free Research)
With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 24, 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Remote Office Backup by Buffalo Technology

May 13, 2010 - (Free Research)
Many remote offices have a relatively small staff, and often lack onsite technical expertise or corporate IT staff. Yet the data generated by the staff at remote offices is a corporate asset that should be backed up just like data at corporate headquarters. 
(WHITE PAPER) READ ABSTRACT |

Your CEO Wants to Connect a New Device to the Corporate Network. Now What? by Sophos, Inc.

November 01, 2013 - (Free Research)
This exclusive paper examines the key challenges, risks and rewards of BYOD, discussing how to implement the right strategy to mitigate security concerns. 
(WHITE PAPER) READ ABSTRACT |

Applications and best practices to keep your mobile devices secure by Good Technology

March 06, 2012 - (Free Research)
Uncover best practices for keeping your mobile devices and applications secure. 
(EGUIDE) READ ABSTRACT |

Stopping Crimeware In Its Tracks by FireEye

September 2008 - (Free Research)
This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks. 
(ANALYST REPORT) READ ABSTRACT |

Corporate networks: Business 2.0 and beyond by SonicWALL

July 2009 - (Free Research)
The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Smart Devices, Smart Security by Voltage Security, Inc.

July 2012 - (Free Research)
This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007 by F5 Networks

November 2007 - (Free Research)
One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution. 
(WHITE PAPER) READ ABSTRACT |

Guide to Deploying and Troubleshooting Video in the Enterprise by Fluke Networks

December 2010 - (Free Research)
Recently, a study commissioned by Cisco® Systems made a prediction that added a new word to the lexicon of the network engineer and IT director: zetabyte. The study predicted that by 2013, two-thirds of a zetabyte of video traffic would be on corporate networks. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication and Druva inSync by Druva Software

October 2010 - (Free Research)
Enterprises are seeking new ways to keep up with the challenges of managing and protecting their rapidly expanding corporate data. While data growth is not new, the pace of growth has become more rapid, the location of data more dispersed, and the linkage between data sets more complex. This hitepaper explains source based deduplication technology. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Enterprise Network by Infoblox

August 2013 - (Free Research)
This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps. 
(WHITE PAPER) READ ABSTRACT |

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses by McAfee, Inc.

August 2013 - (Free Research)
NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis. 
(ANALYST REPORT) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility by SonicWALL

February 2011 - (Free Research)
This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks. 
(EBOOK) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts