Operate Risks SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Operate Risks Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Security Policies
 •   Network Security
 •   Data Security
 •   Security Monitoring
 •   Endpoint Security
 •   Managed Security Services
 •   Identity Management/ User Provisioning
 •   Access Control
 •   Operating Systems and Subsystems

Related Searches
 •   Application Of Operate
 •   Conference Operate
 •   Mapping Operate
 •   Operate Contract
 •   Operate Corporation
 •   Operate Erp
 •   Operate On-Line
 •   Operate Risks Utah
 •   Request Operate Risks Security
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Closing the print security gap by ComputerWeekly.com

November 07, 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

3 Strategies to Protect Endpoints from Risky Applications by Lumension

September 10, 2010 - (Free Research)
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension

May 11, 2009 - (Free Research)
This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management. 
(ANALYST REPORT) READ ABSTRACT |

The "Hard Truths" About Managing Administrative and Application Identities by Cyber-Ark Software

July 2008 - (Free Research)
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy. 
(VIDEOCAST) READ ABSTRACT |

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management by CA Technologies.

January 2013 - (Free Research)
This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

IBM X-Force 2010 Trend and Risk Report by IBM

May 2011 - (Free Research)
This IBM X-Force offers latest security trends to help you better understand how to protect your systems and networks and offers ways to improve your security strategy. Read this report for an overview of latest security threats and how to detect them, operate a secure infrastructure, develop secure software, and more. 
(ANALYST REPORT) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

Deloitte Consulting Presents: Risk and TCO in Single and Multivendor Networks by Cisco Systems, Inc.

March 2012 - (Free Research)
Can a multivendor network infrastructure actually reduce your overall costs, as some claim? To answer this question, Deloitte Consulting conducted in-depth research looking at enterprises' total cost of ownership (TCO), including capital outlays, operating expenses, and analyzed risks associated with the network. 
(WHITE PAPER)

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by CA Technologies.

July 2010 - (Free Research)
Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies. 
(ANALYST REPORT) READ ABSTRACT |

Why "Free" Patch Management Tools Could Cost You More by Lumension

November 2008 - (Free Research)
While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS) by Trend Micro

December 2013 - (Free Research)
Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment. 
(WHITE PAPER) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

How to tackle risk lifecycle management by ComputerWeekly.com

November 2010 - (Free Research)
The Jericho Forum’s Collaboration Oriented Architectures (COA) enable enterprises that build COAcompliant architectures to operate in a secure and reliable manner. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Security Best Practices to Protect Corporate Data by SearchSecurity.com

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks. 
(EGUIDE) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

March 2012 - (Free Research)
This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy. 
(WHITE PAPER) READ ABSTRACT |

10 best practice suggestions for common smartphone threats by Dell SecureWorks UK

August 2011 - (Free Research)
Mobile devices have introduced a whole new set of risks into enterprise security, and IT teams need strategies to protect against them. Read this paper to uncover 10 of the most common threats associated with smartphones and mobile devices, along with best practices to help mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Content-Aware Identity & Access Management in a Virtual Environment by CA Technologies.

June 2010 - (Free Research)
Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.  
(WHITE PAPER) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts