Policies WebWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policies Web returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Security Monitoring
 •   Data Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Content Filtering
 •   Intrusion Detection/ Forensics
 •   Social Networks and Community Management
 •   Endpoint Security
 •   Managed Security Services

Related Searches
 •   About Policies Web
 •   Batch Policies
 •   Finds Policies Web
 •   Firms Policies Web
 •   Policies Asp
 •   Policies India
 •   Policies Prices
 •   Policies Web Articles
 •   Policies Web Schedules
 •   Sql Policies Web
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 10, 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Selecting the right DLP solution: Enterprise, Lite, or Channel? by Websense, Inc.

October 06, 2011 - (Free Research)
DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more. 
(WHITE PAPER) READ ABSTRACT |

Content Filtering: Taming the Wild Web by SearchSecurity.com

June 21, 2012 - (Free Research)
Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy. 
(EGUIDE) READ ABSTRACT |

WebPulse Collaborative Defense by BlueCoat

November 04, 2011 - (Free Research)
Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide. 
(WHITE PAPER) READ ABSTRACT |

Effective Web Policies: Ensuring Staff Productivity and Legal Compliance by Sophos, Inc.

September 2008 - (Free Research)
This paper discusses how to create a policy that balances an organization's need for protection against an individual's expectations. 
(WHITE PAPER) READ ABSTRACT |

Automating Group Policy Management by SDM Software

March 2008 - (Free Research)
Group policy objects (GPOs) are used to secure and lockdown your Windows environment. Learn how you can ensure that GPOs are available, manageable and automated. 
(WHITE PAPER) READ ABSTRACT |

Increase ARPU, Add Applications and Ensure Policy, QoS and Security by Mu Dynamics

February 2011 - (Free Research)
Recent rulings around Net Neutrality and Lawful Intercept are enabling service providers to take more control over the applications running on their networks. But, due to Facebook and Twitter, operators are struggling to test these policies. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World by Webroot

August 2013 - (Free Research)
This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies by SearchWinIT

May 2010 - (Free Research)
When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk. 
(EZINE)

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World by Webroot

May 2013 - (Free Research)
This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more. 
(CASE STUDY) READ ABSTRACT |

Is Your Acceptable Use Policy Social Media-proof? by M86 Security

February 2011 - (Free Research)
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment. 
(WHITE PAPER) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Protecting Against Web Threats by SearchSecurity.com

December 2009 - (Free Research)
Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies. 
(EBOOK) READ ABSTRACT |

Policy Reference Guide: Blackberry Enterprise Server by BlackBerry

December 2008 - (Free Research)
Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Business Rule Management: Automating Policy Management by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses how business rules management systems can be used to meet the diverse range of stakeholder requirements associated with an automated policy management system. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

BYOD Financial Assessment Tool by Cisco Systems, Inc.

November 2013 - (Free Research)
This exclusive resource allows you to assess the incremental value from implementing a BYOD policy more strategically in your business. 
(ASSESSMENT TOOL) READ ABSTRACT |

Simplify Security for REST and WS* Web Services: The Gateway Approach by Intel

March 2011 - (Free Research)
This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code. 
(WHITE PAPER) READ ABSTRACT |

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by IronKey

May 2009 - (Free Research)
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Infrastructure Predictions: 2014 and Beyond by Cisco Systems, Inc.

January 2014 - (Free Research)
This slide show details five predictions for data center infrastructure for 2014 and beyond. 
(RESOURCE) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

Exploring New Features, Uses for Secure Web Gateway Appliances by SearchSecurity.com

February 2013 - (Free Research)
In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts