Operations SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Operations Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Networks
 •   Access Control
 •   Operations Planning

Related Searches
 •   Files Operations
 •   Improve Operations Security
 •   Infrastructure Operations Security
 •   Layout Operations
 •   Operations Definitions
 •   Operations Rfi
 •   Operations Security Nevada
 •   Operations Security Web Cast
 •   Patent Operations Security
 •   Profile Operations
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Bridging the Gap: Security, Operations & Compliance by eIQnetworks

February 16, 2009 - (Free Research)
Read this white paper to see why SecureVue delivers the most cost effective and comprehensive technical solution on the market today to manage security, operations and compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

State Agency Boost Security and Reduces Costs with GoToMyPC Corporate by Citrix Online

January 2005 - (Free Research)
The Texas Department of Family and Protective Services gives top priority to securing the information gathered for its investigations and cases. 
(CASE STUDY) READ ABSTRACT |

File Security: Audit and Protect Critical Files by Imperva

August 2010 - (Free Research)
Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices. 
(WHITE PAPER) READ ABSTRACT |

Enhanced Cloud Security with HyTrust and VMware by Intel

October 2011 - (Free Research)
Many organizations today are eager to adopt cloud computing, yet recent cloud surveys cite that security, control, and IT compliance are primary issues that are slowing down the adoption of cloud computing. This resource is tailored to assist security administrators with design, validation and utilization of cloud implementations. 
(WHITE PAPER) READ ABSTRACT |

Demand More From Your Data Center Environment by Iron Mountain

December 2013 - (Free Research)
This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more. 
(WHITE PAPER) READ ABSTRACT |

Improving Tools and Techniques to Combat Malware Evolution by Webroot

October 2012 - (Free Research)
Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes. 
(WHITE PAPER) READ ABSTRACT |

Session Border Controllers: Addressing Tomorrow's Requirements by Metaswitch Networks

September 2011 - (Free Research)
This white paper discusses how IP-based service innovation will impact and shape the future of session border controllers. 
(WHITE PAPER) READ ABSTRACT |

Converting to the Cloud and Tackling the Challenges Within by Tenable Network Security (E-mail this company)

October 2013 - (Free Research)
In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so. 
(EGUIDE) READ ABSTRACT |

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Citizen Machinery Achieves Real Time Asset Management Accuracy with Hitachi IT Operations Director by Hitachi Data Systems

May 2011 - (Free Research)
In this case study, Citizen Machinery Co. was challenged with improving efficiency in its IT asset management and Hitachi helped to address the issue with Hitachi IT Operations Director, which has contributed to the strengthening of both IT controls and security measures. 
(WHITE PAPER) READ ABSTRACT |

Securing Your IT Infrastructure with SOC/NOC Collaboration by Hewlett-Packard Company

September 2012 - (Free Research)
Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security. 
(WHITE PAPER) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

State of Security Operations by Hewlett-Packard Company

January 2014 - (Free Research)
With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014. 
(WHITE PAPER) READ ABSTRACT |

EMC Virtual Infrastructure Data Protection by EMC Corporation

EMC Virtual Infrastructure Data Protection solutions guard your virtual infrastructure applications and data from downtime and provide the availability you expect for critical workloads. It combins backup and recovery technologies with VMware server virtualization. 
(SOFTWARE PRODUCT)

Building a Successful Security Operations Center by ArcSight, an HP Company

December 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

Extend the Monitoring of Distributed Applications with Operations Manager 2007 to Heterogeneous Environments with Jalasoft Xian Io by JALASOFT

March 2008 - (Free Research)
The Distributed Application Designer allows administrators to graphically define components which make up a service. Underlying is Operations Manager System Definition Model (SDM). 
(WHITE PAPER) READ ABSTRACT |

Data Quality: The Foundation of Operational Effectiveness by Pitney Bowes Group 1 Software

September 2011 - (Free Research)
This white paper discusses the importance of data quality operations and how to successfully implement a data quality strategy into your organization. 
(WHITE PAPER) READ ABSTRACT |

Operations Energy Management: From Data Center through Facilities by CA Technologies.

December 2008 - (Free Research)
Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center. 
(WHITE PAPER) READ ABSTRACT |

Integrating Vulnerability Assessment and Remediation by Lumension

August 2008 - (Free Research)
An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies. 
(WHITE PAPER) READ ABSTRACT |

The Future of Business-Critical Networking by Cavalier

May 2010 - (Free Research)
Your network must deliver non-stop services to support business operations and be highly scalable to support future growth. It must also address multiple communications needs cost-effectively and flexibly. The communications network must meet the demands of a dynamic business-critical environment. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

ERP and the Cloud: Working Together to Transform the Back Office by Oracle Corporation

September 2012 - (Free Research)
This resource describes an enterprise-grade cloud offering that combines the power of Oracle ERP applications with the simplicity of the cloud. Read on to learn how this approach transforms back-office operations while offering flexible deployment, global security and performance, and more. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Deep Security: VMWare vSphere with Operations Management by Trend Micro

February 2014 - (Free Research)
This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more. 
(WHITE PAPER) READ ABSTRACT |

U.S. Navy Cyber Defense Operations Command by Novell, Inc.

December 2009 - (Free Research)
Using Novell® Sentinel™ as part of its PROMETHEUS system, the Navy Cyber Defense Operations Command (NCDOC) has automated and centralized security monitoring across hundreds of diverse locations worldwide. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts