Operating Information Security ManagerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Operating Information Security Manager returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Security Policies
 •   Data Security
 •   Enterprise Systems Management
 •   Data Center Management
 •   Virtualization
 •   Network Security
 •   Security Monitoring
 •   Application Security
 •   Availability, Performance and Problem Management

Related Searches
 •   Expert Operating Information Security
 •   Latest Operating Information Security
 •   Manuals Operating Information Security
 •   Net Operating
 •   Operating Computers
 •   Operating Information Manufacturer
 •   Operating Information Markets
 •   Softwares Operating Information Security
 •   Standards Operating Information
Advertisement

ALL RESULTS
1 - 25 of 426 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities by IBM

September 01, 2008 - (Free Research)
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Open Information Security Management Maturity Model (O-ISM3) by ComputerWeekly.com

January 12, 2011 - (Free Research)
The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements. 
(WHITE PAPER) READ ABSTRACT |

End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control by Sun Microsystems, Inc.

July 2008 - (Free Research)
This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

ESET File Security for Linux/BSD/Solaris by ESET

August 2010 - (Free Research)
Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by ESET

March 2011 - (Free Research)
ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now. 
(EZINE) READ ABSTRACT |

Simplify Compliance and Security with Novell® Sentinel™ Log Manager by Novell, Inc.

March 2011 - (Free Research)
Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware. 
(WHITE PAPER) READ ABSTRACT |

Balancing Security and Usability of Mobile Devices by BlackBerry

July 2012 - (Free Research)
This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability. 
(WHITE PAPER) READ ABSTRACT |

Manager's Guide to Oracle Cost Containment by EnterpriseDB Corporation

June 2009 - (Free Research)
This Webcast explores a variety of cost containment strategies for IT, as well as potential risk and reward scenarios. 
(WEBCAST) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Dell Networking W-Series ClearPass Onboard: A ClearPass Policy Manager Application by Dell, Inc.

September 2013 - (Free Research)
This informative paper examines a networking tool that automatically provisions and configures personally-owned mobile devices, enabling them to securely connect to your network in support of BYOD initiatives regardless of operating system. 
(WHITE PAPER) READ ABSTRACT |

Q-EKM: Quantum Encryption Key Manager: Enterprise Proven Security for Your Valuable Data at Rest by Quantum Corporation

July 1967 - (Free Research)
Quantum's Encryption Key Manager (Q-EKM) is an Enterprise proven, easy-to-use solution for managing encryption keys across multiple Quantum libraries. 
(WHITE PAPER) READ ABSTRACT |

CW+: Analyst's take: Alfabet PlanningIT reaps rewards for decision makers by ComputerWeekly.com

January 2011 - (Free Research)
When organizations adopt Alfabet’s planningIT, decision makers have more knowledge about their operating environments and use this information to leverage existing assets and avoid unnecessary investments in software or development. 
(WEBCAST) READ ABSTRACT |

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints by Viewfinity

December 2011 - (Free Research)
Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way. 
(WHITE PAPER) READ ABSTRACT |

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Rewriting the rules of Patch Management by IBM

July 2011 - (Free Research)
IBM Tivoli Endpoint Manager helps organizations automatically manage patches for multiple operating systems and applications across hundreds of thousands of endpoints regardless of location, connection type or status. 
(WHITE PAPER) READ ABSTRACT |

Ten ways to manage data growth and other top storage challenges by IBM

October 2011 - (Free Research)
This white paper describes ten ways that IBM's highly scalable data protection software can help organizations save money while addressing their data storage challenges, including those associated with exponential data growth. 
(WHITE PAPER) READ ABSTRACT |

Security Vs. Flexibility: Must IT Management Choose? by Faronics

August 2008 - (Free Research)
This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed. 
(WHITE PAPER) READ ABSTRACT |

Roadmap for Implementing a Multi-Site IP Contact Center by Avaya Inc.

May 2008 - (Free Research)
Explore a three-part guide to identifying the potential presented by Internet Protocol (IP), building a business case for migration to IP and ultimately designing and implementing an IP infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris and Oracle SPARC T4 Servers – Engineered Together for Enterprise Cloud Deployments by Oracle Corporation

November 2011 - (Free Research)
In today’s complex business environments, IT managers are driven to lower both capital and operating expenditures while increasing capacity for more application services and growing markets. Read this white paper to learn how many of these challenges can be addressed by effective implementation of chip multithreading (CMT) technology-based servers. 
(WHITE PAPER) READ ABSTRACT |

Cloud Management Using Oracle Enterprise Manager 11g by Oracle Corporation

April 2010 - (Free Research)
Read this white paper to learn how systems management applications can provide an integrated solution for testing, deploying, operating, monitoring, diagnosing and resolving problems in today’s complex IT environments. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 426 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts