Professional Security Issues ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Professional Security Issues Management returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Security Monitoring
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Managed Security Services

Related Searches
 •   Export Professional
 •   Linux-Based Professional
 •   Networks Professional Security Issues
 •   Offices Professional Security
 •   Professional Design
 •   Professional Operations
 •   Professional Security Configurations
 •   Professional Security Issues Wireless
 •   Protocol Professional Security Issues
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

SharePoint Security Should Not Be an Afterthought by Thawte Inc.

May 20, 2013 - (Free Research)
This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 19, 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 11, 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Applying the Four Standards of Security-Based CIA by Global Knowledge

October 28, 2013 - (Free Research)
High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats. 
(WHITE PAPER) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 16, 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation by Tripwire, Inc.

February 07, 2011 - (Free Research)
This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Information Security Magazine by SearchSecurity.com

February 03, 2014 - (Free Research)
In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year. 
(EGUIDE) READ ABSTRACT |

AirMagnet WiFi Analyzer by AirMagnet

August 15, 2011 - (Free Research)
AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities. 
(TRIAL SOFTWARE) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 10, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Computing Security Research Video: What’s Holding Back the Cloud? by Intel

May 29, 2013 - (Free Research)
This video will share the results of a survey questioning IT professionals on their thoughts and feelings when it comes to cloud security. Watch and learn what is on the forefront of these professionals minds when it comes to securing the cloud, and what you can do to address these concerns. 
(VIDEO) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 10, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Business leaders agenda 2012 by ComputerWeekly.com

March 2012 - (Free Research)
This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook. 
(RESOURCE) READ ABSTRACT |

Computer Weekly - 7 February 2012: IT investment priorities by ComputerWeekly.com

February 2012 - (Free Research)
In this week’s Computer Weekly, we examine exclusive research into the investment priorities of UK IT decision-makers, which shows virtualisation, Windows 7 and security as the top areas for spending this year. We analyse the changing nature of database architecture; and the BBC’s Chief Technology Officer talks about IT plans for the broadcaster. 
(EZINE) READ ABSTRACT |

Mobile EndPoint Security and Management - Best Practices by SearchSecurity.com

March 2013 - (Free Research)
Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - February 2013 by SearchSecurity.com

February 2013 - (Free Research)
In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more. 
(EZINE) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Using Encrypting File System to Protect Microsoft Dynamics CRM Data on a V3c Client Running Windows XP Professional by Microsoft

June 2007 - (Free Research)
This white paper explains how to use Encrypting File System (EFS), a feature that is provided by default in the Windows® operating system, to protect data in Microsoft Dynamics CRM clients for Outlook Compatibility Update running on Windows XP Professional Service Pack 2 (SP2). 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends by ComputerWeekly.com

August 2011 - (Free Research)
In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now. 
(EBOOK) READ ABSTRACT |

Smart Policies for Personal-Liable Smartphones by BlackBerry

April 2010 - (Free Research)
This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance by Skybox Security

October 2009 - (Free Research)
PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts