Operational SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Operational Security returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Network Security
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Security
 •   Authentication / Password Management
 •   Managed Security Services

Related Searches
 •   Benefit Of Operational
 •   Comparing Operational
 •   Make Operational
 •   Operational Security California
 •   Operational Tools
 •   Practice Operational Security
 •   Us Operational Security
 •   Value Operational Security
 •   Wireless Operational Security
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to select a KVM over IP system to assist with HIPAA compliance by Avocent

February 12, 2008 - (Free Research)
Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA. 
(WHITE PAPER) READ ABSTRACT |

A pragmatic approach to security - How to stay secure in 2012 by Dell SecureWorks UK

November 18, 2011 - (Free Research)
While it can be tempting to simply buy new security technologies to solve your problems, they are unlikely to help if the basics of an effective security practice are not in place. In this white paper, discover how your organisation can apply pragmatism to IT security and do more with what you already have. 
(WHITE PAPER) READ ABSTRACT |

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network by nCircle

August 02, 2010 - (Free Research)
This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact. 
(WHITE PAPER) READ ABSTRACT |

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network by nCircle

March 02, 2009 - (Free Research)
Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis. 
(WHITE PAPER) READ ABSTRACT |

Virtual Compliance In The VMware Automated Data Center by LogLogic, Inc.

July 21, 2011 - (Free Research)
Switching to a virtual infrastructure not only provides benefits, but also comes with significant change, and organizations must find new ways to collect and manage logs. This paper explores log management in virtualized environments, including its challenges and opportunities. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Single Sign-On The Holy Grail of Computing by Dell Software

October 02, 2009 - (Free Research)
In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges. 
(WHITE PAPER) READ ABSTRACT |

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask by Third Brigade

July 1967 - (Free Research)
This white paper identifies 12 critical questions that organizations need to consider when selecting a HIPS product. These questions relate to protection, manageability, integration and speed. 
(WHITE PAPER) READ ABSTRACT |

Applying the Four Standards of Security-Based CIA by Global Knowledge

October 2013 - (Free Research)
High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats. 
(WHITE PAPER) READ ABSTRACT |

Practical Steps to Achieve and Maintain NERC Compliance by Tripwire, Inc.

December 2008 - (Free Research)
This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals. 
(WHITE PAPER) READ ABSTRACT |

Protecting the Dynamic Datacenter by Trend Micro

August 2009 - (Free Research)
Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Operational Efficiencies of Proactive Vulnerability Management by McAfee, Inc.

August 2011 - (Free Research)
View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation. 
(WHITE PAPER) READ ABSTRACT |

Boston Medical Center cuts data center power bill by 50% and saves up to $3.2 million with virtualized storage, server and desktop solutions by Dell, Inc.

June 2010 - (Free Research)
Read this case study to gain more detail into Boston Medical center's quest to lower its operational costs, why it settled on data center virtualization and the benefits it reaped, including $3.2 million in savings in equipment avoidance costs, improved security with desktop virtualization and so much more. 
(CASE STUDY) READ ABSTRACT |

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations by IBM

August 2011 - (Free Research)
Organizations must implement the right IT GRC controls to meet meet regulatory requirements in areas of specific concern to auditors and reduce operational risk. Learn how IBM provides the capabilities to tackle specific compliance and audit requirements and address issues affecting long-term, ongoing risk management. 
(WHITE PAPER) READ ABSTRACT |

Succeeding with Data Virtualization - High Value Use Cases for Operational and Data Management Data Services by Denodo Technologies

March 2012 - (Free Research)
This paper discusses virtual data services for operational business processing and data management as well as successful virtualization use cases. 
(WHITE PAPER) READ ABSTRACT |

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous by Iron Mountain

May 2013 - (Free Research)
This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Deep Security 7.5 vs. McAfee and Symantec by Trend Micro, Inc.

February 2011 - (Free Research)
Server and desktop virtualization are essential elements of any IT strategy that seeks to decrease capital and operational expenditures. In the rush to implement virtualization technologies, many organizations simply deploy the same anti-virus solution that is in use on their physical server and desktop systems. 
(TEST RESULTS) READ ABSTRACT |

Built for Virtualization: Combining Dell’s Storage and Server Solutions to Maximize Operational Efficiency and Minimize Cost of Ownership by Dell, Inc.

February 2010 - (Free Research)
This paper explores the current state of the virtualized datacenter architecture and the limitations it places on operational efficiency. It concludes with a detailed analysis of Dell's combined storage and server solutions and their proven ability to dramatically improve operational efficiency in highly virtualized infrastructures. 
(WHITE PAPER) READ ABSTRACT |

The New Encryption Generation: Closing the Gap by CREDANT Technologies

September 2008 - (Free Research)
This white paper examines the limitations of first-generation encryption processes that often deliver less-than-promised performance, spur user resistance, conflict with operational infrastructure and process requirements. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Financial Institutions: Managing Operational Risk with RSA® Archer® by RSA, The Security Division of EMC

November 2013 - (Free Research)
Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program. 
(WHITE PAPER) READ ABSTRACT |

Taking a Strategic Approach to Risk Management by TraceSecurity

December 2012 - (Free Research)
This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more. 
(EGUIDE) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

Beyond UTM -- The Value of a Purpose-built Network Security Platform by Fortinet, Inc.

August 2007 - (Free Research)
It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Logs: Data Warehouse Style by LogLogic, Inc.

September 2008 - (Free Research)
The LogLogic Log Management Data Warehouse enables organizations to centralize log data for easy, efficient access -- ensuring IT security, regulatory compliance, and operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts