Policies MeasuresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policies Measures returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Wireless Security
 •   Application Security
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Charts Policies Measures
 •   Papers Policies
 •   Policies Calendars
 •   Policies Matrix
 •   Policies Measures Application
 •   Policies Measures Cycles
 •   Policies Measures E-Commerce
 •   Policies Measures Reseller
 •   Rfi Policies
 •   Suite Policies Measures
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Resource Protection in Virtualized Infrastructures by Intel

September 03, 2009 - (Free Research)
This paper provides an overview of security concerns and considerations that organizations must address when implementing virtualization. 
(WHITE PAPER) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 18, 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 01, 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 20, 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Automating Your SOA Center of Excellence by WebLayers

May 2008 - (Free Research)
This white paper discusses the steps necessary for implementing an effective SOA Center of Excellence. Explore how to automate and apply the appropriate levels of SOA governance. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

Preventing Malware Attacks by SearchSecurity.com

February 2012 - (Free Research)
As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware. 
(EGUIDE) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

July 2010 - (Free Research)
With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Mobile Device Security Best Practices by SearchSecurity.com

September 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen. 
(EGUIDE) READ ABSTRACT |

MDM features vs. native mobile security by SearchSecurity.com

April 2012 - (Free Research)
When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each. 
(EGUIDE) READ ABSTRACT |

How to measure successful internal talent mobility by Oracle Corporation

October 2013 - (Free Research)
This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content. 
(WHITE PAPER) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2011 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Three Must-Have Security Measures to Empower Data Centre Transformation by Cisco (E-mail this company)

July 2013 - (Free Research)
As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning. 
(WHITE PAPER)

Big Data and Content Analytics: measuring the ROI by ComputerWeekly.com

December 2013 - (Free Research)
Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Security Think Tank: Bring your own device by ComputerWeekly.com

June 2013 - (Free Research)
With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI compliance with Dell SecureWorks' security services by Dell, Inc.

May 2011 - (Free Research)
It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance. 
(WHITE PAPER) READ ABSTRACT |

Why Compliance Pays: Reputations and Revenues at Risk Research Report by Symantec Corporation

March 2009 - (Free Research)
Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts