Parts Of AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Parts Of Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Managed Security Services
 •   Automated Security Auditing/ Source Code Analysis
 •   Endpoint Security

Related Searches
 •   Application Of Parts
 •   Disk Parts Of
 •   Parts Guides
 •   Parts Of Assessment Connecticut
 •   Parts Of Contracts
 •   Parts Of Digital
 •   Parts Of Offices
 •   Parts Organization
 •   Repairs Parts Of
 •   Survey Parts
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 09, 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program Part 2 by IBM

September 20, 2011 - (Free Research)
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization. 
(EGUIDE) READ ABSTRACT |

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry by IBM

March 22, 2011 - (Free Research)
This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models. 
(EGUIDE) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

America's Quest for IPv6 - Part II: An Analysis of the Business and Financial Metrics of the Coming IPv6 Marketplace by Command Information

June 2008 - (Free Research)
the transition to IPv6 is very much on its way to becoming a viable, profitable market. This white paper this conclusion with some attention grabbing highlights... 
(WHITE PAPER) READ ABSTRACT |

Discovering Vulnerable Web Applications by Qualys

August 2012 - (Free Research)
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

EMC File Virtualization Solutions by EMC Corporation

EMC File Virtualization Solutions comprise both technology assessment and design services to help your IT organization optimize its network-attached storage investments. Simplify management and optimize the efficiency of network-attached storage. 
(SOFTWARE PRODUCT)

Website Security Threat Report, Part Two by Symantec Corporation

October 2013 - (Free Research)
This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Compliance and Risk Management: Factoring compliance as part of your risk management equation by IBM

November 2011 - (Free Research)
Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more. 
(EBOOK) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Cloud Computing for Business by ComputerWeekly.com

February 2012 - (Free Research)
This  guide from the Open Group, offers advice on assessing how cloud fits into your IT organisation 
(IT BRIEFING) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by SearchSecurity.com

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

Targeted attacks: Preparation and Mitigation by SearchSecurity.com

May 2013 - (Free Research)
This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy. 
(EGUIDE) READ ABSTRACT |

eGuide: Information Security - Buyer's Guide to Messaging Security by SearchSecurity.com

November 2009 - (Free Research)
Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging. 
(EGUIDE) READ ABSTRACT |

Email as Part of a Business Continuity Strategy: Why always-on-business requires always-on-email by Mimecast

November 2010 - (Free Research)
The paper looks at the general approaches available to ensure email continuity from a high level and the implications of deploying each strategy on infrastructure, budget, people and resilience. 
(WHITE PAPER) READ ABSTRACT |

Securing Embedded Software with Threat Modeling by Klocwork

September 2011 - (Free Research)
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Monitoring Strategies for Insider Threat Detection by ArcSight, an HP Company

December 2010 - (Free Research)
Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics. 
(EGUIDE) READ ABSTRACT |

Build in security and drive innovation by IBM

November 2011 - (Free Research)
Hear from Patrick Vandenberg, IBM Security & Compliance Marketing Manager and Ewa Hoyt, IBM Security Application & Compliance Marketing manager, on how to make application security part of your development process. Reduce risk and costs, and keep your development teams productive to drive the innovation you need to compete and win. 
(PODCAST) READ ABSTRACT |

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by SearchSecurity.com

February 2013 - (Free Research)
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now. 
(EGUIDE) READ ABSTRACT |

The New Face of Intrusion Prevention by Check Point Software Technologies Ltd.

June 2009 - (Free Research)
Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions. 
(WHITE PAPER) READ ABSTRACT |

Offshore Software Test Automation: A Strategic Approach to Cost and Speed Effectiveness by LogiGear Corporation

August 2008 - (Free Research)
This white paper presents an overview of an innovative approach to integrating global resourcing and the latest test automation tools. It also explores the software development and testing process, global resourcing and the automation of software testing. 
(WHITE PAPER) READ ABSTRACT |

Online Content Speaks Volumes by Sitecore

July 2008 - (Free Research)
This whitepaper examines the results of a survey by Aberdeen in which 300+ executives, users, and managers of online content management systems were asked the methods they use for building their web content management and delivery models. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts