Nsa Security SeminarsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Nsa Security Seminars returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Network Security
 •   Data Security
 •   Application Management and Maintenance
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Firewalls
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security

Related Searches
 •   Manufacturers Nsa
 •   Nsa Security Methodology
 •   Nsa Security Order
 •   Nsa Security Seminars Canadian
 •   Nsa Security Seminars Desktop
 •   Nsa Security Seminars Open
 •   Purchasing Nsa Security Seminars
 •   Source Nsa Security Seminars
 •   Web Cast Nsa Security
 •   Workflow Nsa Security
Advertisement

ALL RESULTS
1 - 25 of 494 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration by IntraLinks, Inc

April 17, 2014 - (Free Research)
This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data. 
(WHITE PAPER) READ ABSTRACT |

NSA Series data sheet by Dell Software

June 30, 2013 - (Free Research)
In this data sheet, see how your organization can be both secure and productive without compromising network performance thanks to Dell's SonicWALL™ NSA Series next-generation firewalls. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation Firewall by SonicWALL

February 28, 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 17, 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Intelligent real-time protection and application control by SonicWALL

March 17, 2011 - (Free Research)
It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network. 
(WHITE PAPER) READ ABSTRACT |

Legal briefing: The Draft EU General Data Protection Regulation by ComputerWeekly.com

January 28, 2014 - (Free Research)
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

RocketSpace case study by Dell Software

August 31, 2012 - (Free Research)
In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization. 
(CASE STUDY) READ ABSTRACT |

SANS Survey: 20 Critical Security Controls by IBM

June 30, 2013 - (Free Research)
This SANS report explores the execution of Critical Security Controls (CSCs) and how organizations have responded thus far. Read on to learn more about its implications on the future of security controls. 
(WHITE PAPER) READ ABSTRACT |

BGMX Retail Solutions Case Study by SonicWALL

February 14, 2011 - (Free Research)
BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines. 
(CASE STUDY) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Who’s Snooping on Your Email? by Sophos, Inc.

December 17, 2013 - (Free Research)
This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption. 
(WHITE PAPER) READ ABSTRACT |

Top Reasons To Choose Red Hat Enterprise Linux by Red Hat and Intel

August 10, 2009 - (Free Research)
You probably already know that some of the largest and most demanding companies trust Red Hat to drive the IT infrastructure behind their successful businesses. This whitepaper will list and discuss the top reasons you should choose Red Hat Enterprise Linux to power the demanding applications you rely on to run your company. 
(WHITE PAPER) READ ABSTRACT |

On-Demand Seminar iOS7 for Business by Apple Inc. (E-mail this company)

April 29, 2014 - (Free Research)
Join us for a 30-minute online seminar with Apple Business Experts to learn about what’s new in iOS7 for business. 
(WEBCAST) READ ABSTRACT |

Clean VPN Approach to Secure Remote Access by SonicWALL

June 2008 - (Free Research)
In this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security. 
(WHITE PAPER) READ ABSTRACT |

Encryption Key Management: A Technical White Paper by Quantum Corporation

October 2007 - (Free Research)
Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity. 
(WHITE PAPER) READ ABSTRACT |

Encryption Key Management: A Technical White Paper by Quantum Corporation

October 2007 - (Free Research)
Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Howard Marks: Rethinking ProtectTIER by IBM

August 2011 - (Free Research)
This transcript supplements information presented during the Backup School seminar series and virtual seminar in 2011. Regardless of your involvement in the series, any IT pro evaluating deduplication technology will find this content to be useful. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Live Fridays (hosted e-Seminar, every Friday at 10am AEST) by Webroot

August 2012 - (Free Research)
Register for a live demo with open Q & A to have all of your important questions answered. If security is bringing your VMs to a standstill, it may be time to make some changes. Luckily, you can protect your virtual systems without hurting performance or adding complexity. Learn more by listening in on this demo. 
(DOWNLOAD) READ ABSTRACT |

iPad in Business: iOS Deployment by Apple Inc. (E-mail this company)

April 2013 - (Free Research)
In this two-part online seminar, you'll learn about deploying iPhone and iPad in business environments. Learn different approaches to deployment, configuration and management options, device management solutions and app deployment. 
(WEBCAST) READ ABSTRACT |

Modern Infrastructure 2013 Seminar by SearchDataCenter.com

October 2013 - (Free Research)
This white paper describes an upcoming event that will teach you how to take back control of your data center. 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing by IBM

March 2010 - (Free Research)
Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

The Virtual Presenter's Handbook by Citrix

July 2012 - (Free Research)
Speaking at a web seminar involves much more skill and strategy than you might expect. Check out this e-book to explore six witty chapters of tips, advice and insight on delivering virtual presentations and learn how to keep your audience tuned in and interested! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 494 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts