Own Corporation VulnerabilityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Own Corporation Vulnerability returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Endpoint Security
 •   Security Policies
 •   Mobile Device Management
 •   Application Security
 •   Network Security
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Security Monitoring

Related Searches
 •   List Own Corporation
 •   New Own Corporation
 •   Own Applications
 •   Own Corporation Vulnerability Uk
 •   Own Vermont
 •   Print Own Corporation
 •   Spreadsheets Own
 •   White Paper Own
 •   Work Own Corporation Vulnerability
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco¬ģ ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard by Qualys, Inc.

May 2008 - (Free Research)
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks. 
(CASE STUDY) READ ABSTRACT |

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid. 
(WHITE PAPER) READ ABSTRACT |

How to Let Staff Use Their Personal Technology Securely by AVG Technologies USA, Inc.

April 2009 - (Free Research)
Many progressive companies see distinct advantages in allowing employees to use personal computers in the office. However, letting employees bring their own technology into the network might mean letting them bring vulnerabilities to network security. Read this paper to learn how to let staff use their personal technology securely. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Corporate Device Ownership and Top Security Concerns by BlackBerry

November 2013 - (Free Research)
This e-guide from the experts at SearchConsumerization.com compares the bring your own device (BYOD) and the corporate-owned, personally enabled (COPE) models of enterprise mobility. Also inside, uncover the perceptions and realities of BYOD security. 
(EGUIDE) READ ABSTRACT |

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension

March 2009 - (Free Research)
Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions. 
(WHITE PAPER) READ ABSTRACT |

HP Virtual Desktop Infrastructure with VMware View: Bring the benefits of industry-standard servers to your desktop environment by HP, Vmware and AMD

January 2009 - (Free Research)
This solution provides a centralized approach to managing your desktop environment and protecting the information within it. It brings the far-reaching benefits of industry-standard servers and shared storage to your desktop environment, while delivering a full virtual PC experience. 
(BROCHURE) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Ensuring application security in mobile device environments by IBM

September 2013 - (Free Research)
This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Prevent Data Leakage and Keep Business Users Happy by BlackBerry

April 2014 - (Free Research)
Consult the following informative white paper to explore how device containerization solutions can improve productivity and reduce security risks without compromising user experience. Learn how to correctly select containerization solutions that best meet your unique requirements and much more. 
(WHITE PAPER) READ ABSTRACT |

Meeting Today's Security Challenges with End-to-end Access Control by Juniper Networks, Inc.

March 2008 - (Free Research)
This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution. 
(WHITE PAPER) READ ABSTRACT |

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness by IBM

January 2014 - (Free Research)
This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Small and Midsize Business guide to Mobile Security by SearchSecurity.com

December 2012 - (Free Research)
In this mobile security FAQ for small to midsize businesses, hear the answers to all of your pressing questions about the mobile threat landscape and what you can do to protect your mobile workforce. Discover how vulnerable SMBs are to mobile threats, tips for evaluating your solution options, and more. 
(WHITE PAPER) READ ABSTRACT |

Improving iPad enterprise management: Security primer by SearchSecurity.com

September 2011 - (Free Research)
Access this expert resource to learn about how to properly manage enterprise-owned iPads and how to combat potential security vulnerabilities. 
(EGUIDE) READ ABSTRACT |

Building a Business Case by SearchSecurity.com

December 2012 - (Free Research)
Small to midsize¬†organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security. 
(WHITE PAPER) READ ABSTRACT |

Making the Most of BYOD Opportunities by Dell and VMware

April 2013 - (Free Research)
Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity. 
(WHITE PAPER) READ ABSTRACT |

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.

October 2010 - (Free Research)
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards. 
(WEBCAST) READ ABSTRACT |

IT in Europe: Breaking the Code: Are passwords destined for obscurity? by SearchSecurity.co.UK

November 2011 - (Free Research)
This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services. 
(EZINE) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

BYOD Security Policy Considerations and Best Practices by SearchSecurity.com

November 2012 - (Free Research)
This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control. 
(EGUIDE) READ ABSTRACT |

Check Point Abra: A Virtual Secure Workspace by Check Point Software Technologies Ltd.

June 2010 - (Free Research)
Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints. 
(WHITE PAPER) READ ABSTRACT |

Quest Software Finds Increased Security, Disaster Preparedness, and Cost Savings through Virtual Desktop Infrastructure by Dell Software

June 2009 - (Free Research)
After evaluating a number of VDI solutions, Quest was most impressed with vWorkspace, one of its own applications that had been integrated into its product portfolio from its 2007 acquisition of Provision Networks. This case study will show how using VDI resulted in significant time and cost savings for Quest. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine - April 2013 by SearchSecurity.com

April 2013 - (Free Research)
This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure. 
(EZINE) READ ABSTRACT |

Stuxnet Under the Microscope by ESET

October 2010 - (Free Research)
This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts