Policy Wave Systems CorpWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policy Wave Systems Corp returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Network Security
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Vulnerability Assessment
 •   Application Security
 •   Access Control

Related Searches
 •   Download Policy Wave
 •   Implementations Of Policy
 •   Linux-Based Policy
 •   Packages Policy Wave Systems
 •   Policy Guides
 •   Policy Wave Metrics
 •   Policy Wave Systems Florida
 •   Policy Wave Systems Functions
 •   Policy Wave Systems Montana
 •   Procurement Policy
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine

March 15, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act. 
(EGUIDE) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 27, 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

E-Book: Encryption - What, Where and How by SearchHealthIT.com

October 26, 2010 - (Free Research)
This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more! 
(EBOOK)

E-Book: Data Protection Plans for Complying with Privacy Laws by SearchSecurity.com & SearchCompliance.com

October 21, 2010 - (Free Research)
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more! 
(EBOOK) READ ABSTRACT |

EMBASSY Remote Administration Server (ERAS) by Wave Systems Corp.

February 01, 2008 - (Free Research)
Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Trusted Computing: What the Future Looks Like by Wave Systems Corp.

September 15, 2010 - (Free Research)
Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries. 
(VIDEOCAST) READ ABSTRACT |

Data Breaches: A Growing Problem for the Healthcare Community by Wave Systems Corp.

March 17, 2011 - (Free Research)
While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss. 
(WHITE PAPER) READ ABSTRACT |

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms by Wave Systems Corp.

August 24, 2010 - (Free Research)
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more. 
(VIDEOCAST) READ ABSTRACT |

Trusted Computing: Establishing Device Authentication by Wave Systems Corp.

August 24, 2010 - (Free Research)
View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard. 
(VIDEOCAST) READ ABSTRACT |

April Essential Guide to Data Protection by SearchSecurity.com

April 11, 2012 - (Free Research)
In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more. 
(EGUIDE) READ ABSTRACT |

August Technical Guide on Authentication by SearchSecurity.com

August 06, 2012 - (Free Research)
This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 12, 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

July 27, 2010 - (Free Research)
With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: New Wave of Automated Tiering Software Eases Migration, Adds Control by Dell Compellent

May 27, 2011 - (Free Research)
In this tutorial on automated tiering, we outline the sub-LUN offerings the major storage vendors are promoting alongside their SSD options. We also explore five questions users need to consider as they evaluate sub-LUN tiering options, and more. 
(EGUIDE) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Web Threats by BlueCoat

January 15, 2009 - (Free Research)
This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings. 
(ANALYST REPORT) READ ABSTRACT |

Rethinking Your Enterprise Security by Hewlett-Packard Company

May 31, 2012 - (Free Research)
The fact is that the world is constantly evolving, and always connected, and your enterprise must be too. View this resource to learn about modern threats and what you should do to remains safe. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Metropolitan Ring for Your Business by AT&T Corp

March 01, 2011 - (Free Research)
Businesses are evolving and looking for more effective and efficient methods of handling bandwidth, performance and end-point needs. In addition, they are trying to anticipate future needs to help make good networking decisions. 
(WHITE PAPER)

Lumension Endpoint Management and Security Suite by Lumension

September 13, 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Integrated Security - McAfee Software and Intel vPro Technology Video by Intel

December 28, 2012 - (Free Research)
This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more. 
(WEBCAST) READ ABSTRACT |

Governance and control: Focus risk management on multiple levers of control by IBM

April 01, 2009 - (Free Research)
Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior. 
(WHITE PAPER) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 01, 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Mobile Health Handbook: Device Security by SearchHealthIT.com

March 06, 2013 - (Free Research)
Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization. 
(EBOOK) READ ABSTRACT |

inStream Solutions launches with Confidence Thanks to Savvis Symphony VPDC by SAVVIS

June 11, 2013 - (Free Research)
Follow this case study to hear about the cloud strategy one organization deployed to improve their test and development environment with an advanced virtual private data center platform. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts