Policies ResearchingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policies Researching returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Mobile Device Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Wireless Technologies and Mobile Computing
 •   Managed Security Services

Related Searches
 •   Linux Policies
 •   Marketing Policies Researching
 •   Method Policies Researching
 •   Policies Hardware Provider
 •   Policies Researching Guidelines
 •   Policies Researching Order
 •   Policies Researching Price
 •   Policies Solutions
 •   Programming Policies Researching
 •   Use Policies Researching
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 01, 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Why Compliance Pays: Reputations and Revenues at Risk Research Report by Symantec Corporation

March 2009 - (Free Research)
Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime. 
(WHITE PAPER) READ ABSTRACT |

Solution Note: Enabling the Secure Use of Facebook by Palo Alto Networks

April 2012 - (Free Research)
With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to Derive Significant Business Value Through Companywide Records Management by Iron Mountain

November 2013 - (Free Research)
Consult the following white paper to uncover how to gain business value from successful, companywide records management. Learn about the risks and costs associated with inconsistent RIM and what you can do to prevent it. 
(WHITE PAPER) READ ABSTRACT |

Why the Cloud for Collaboration? by Cisco Systems, Inc.

November 2013 - (Free Research)
The following IDC research paper discusses the strategic benefits of migrating to a cloud-based collaboration effort as well as insight to challenges and solutions faced by CIOs when considering the move. 
(WHITE PAPER) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

Cisco Mobile Security Survey: Research Highlights by Cisco Systems, Inc.

August 2013 - (Free Research)
Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access. 
(WHITE PAPER) READ ABSTRACT |

Linking Identity and Data Loss Prevention to Avoid Damage to Brand, Reputation and Competitiveness by CA Technologies.

May 2010 - (Free Research)
This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them. 
(WHITE PAPER) READ ABSTRACT |

Email Security in the Cloud: More Secure! Compliant! Less Expensive! by McAfee, Inc.

April 2010 - (Free Research)
Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email. 
(ANALYST BRIEF) READ ABSTRACT |

Best Practices for Organizational Records Management Strategy and Compliance Ready Records Retention Schedules by Iron Mountain

March 2014 - (Free Research)
The following expert e-guide, created by experts at SearchCompliance.com explores the keys to a compliance ready records retention schedule as well as records management strategy such as researching and developing your policy. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

Targeted attacks and how to defend against them by ComputerWeekly.com

August 2013 - (Free Research)
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. 
(ANALYST REPORT) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

Top 10 BYOD Pitfalls to Avoid by SearchSecurity.com

July 2013 - (Free Research)
This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology. 
(EGUIDE) READ ABSTRACT |

IT Security. Fighting the Silent Threat by Kaspersky Lab

October 2013 - (Free Research)
Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks. 
(WHITE PAPER) READ ABSTRACT |

2012 Bit9 Cyber Security Research Report by Bit9, Inc.

May 2012 - (Free Research)
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers. 
(WHITE PAPER) READ ABSTRACT |

What IT Managers Need to Know About IP Surveillance by D-Link

June 2010 - (Free Research)
The video surveillance market is in the throes of transition. IP surveillance is rapidly taking over from traditional analog CCTV. Within the next three years more than half the surveillance cameras used in North America will be IP cameras, according to the research firm Frost & Sullivan. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com by Intel

March 2012 - (Free Research)
Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Critical Need for Encrypted Email and Secure File Transfer Solutions by Proofpoint, Inc.

July 2009 - (Free Research)
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Data Security Challenge by IBM

August 2013 - (Free Research)
In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts