Program Secure DocumentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Program Secure Document returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Mobile Device Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Security

Related Searches
 •   Intrastructures Program Secure Document
 •   Program Analyst
 •   Program Purchasing
 •   Program Secure Document Documents
 •   Program Secure Document Small
 •   Program Secure Document Techniques
 •   Program Secure Printable
 •   Program Secure Repair
 •   Program Secure Time
 •   Program Wisconsin
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange by IntraLinks, Inc

March 10, 2009 - (Free Research)
This is Part I of a white paper series that examines online workspaces, a type of enterprise content management solution delivered in a Software-as-a-Service model. This paper provides an overview of online workspaces as an alternative to current document management methods. 
(WHITE PAPER) READ ABSTRACT |

Effective print management by ComputerWeekly.com

April 02, 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy. 
(ANALYST REPORT) READ ABSTRACT |

Veracode eLearning Subscription by Veracode, Inc.

May 07, 2010 - (Free Research)
Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more. 
(TRAINING GUIDE) READ ABSTRACT |

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 01, 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

The secrets of highly effective data governance programs by Pitney Bowes Group 1 Software

September 16, 2011 - (Free Research)
The first key to a successful data governance program is ensuring user and organization expectations. To find out more secret advice for highly effective data governance programs read this expert e-Book. Our editorial team has gathered tips, techniques and best practices to plan a successful data governance plan. 
(EBOOK)

Convenient, Compliant, and Cost-effective Information Destruction by Iron Mountain

June 01, 2012 - (Free Research)
56% of organizations’ sensitive or confidential information is still contained on paper documents. Discover the advantages of adding a secure shredding strategy to your information destruction program and gain the peace of mind that your company’s information is safe, even after it’s been destroyed. 
(WHITE PAPER) READ ABSTRACT |

BYOD Security Strategies: Balancing BYOD Risks and Rewards by SearchSecurity.com

September 23, 2013 - (Free Research)
This expert guide takes an in-depth look at BYOD security strategies, outlining what crucial factors you need to keep in mind and how you can ensure a successful and secure BYOD initiative. 
(EGUIDE) READ ABSTRACT |

Embracing BYOD through secure app and data delivery EMM by Citrix

December 30, 2013 - (Free Research)
This exclusive paper discusses an enterprise mobility management (EMM) solution that empowers consumerization and bring your own device (BYOD) programs through secure application and data delivery allowing for a diverse, productive and efficient mobile environment. 
(WHITE PAPER) READ ABSTRACT |

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.

February 08, 2011 - (Free Research)
Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: Ease compliance efforts with a robust information security program by IBM

August 25, 2011 - (Free Research)
This expert tip highlights the various ways compliance has advanced information security, the new challenges it has introduced and how security pros can further their efforts to adequately secure the organization. 
(EGUIDE) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure by Sophos, Inc.

February 25, 2014 - (Free Research)
This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the trend while ensuring that your sensitive data is protected. 
(WHITE PAPER) READ ABSTRACT |

Best practices to make BYOD simple and secure by Citrix

June 01, 2014 - (Free Research)
Gain best practices and key considerations to keep in mind when implementing a Bring Your Own Device (BYOD) program. Find out how you can simplify management and reduce costs while keeping data secure and compliant in this resource. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation API Delivery Platform : How to Use an API Server to Manage, Deliver and Secure APIs by Vordel now part of Axway

April 18, 2013 - (Free Research)
In this white paper, discover the next generation of APIs: API delivery platforms and servers. Read on for more information and details on API management, security, and delivery, the next generation of application architecture, key app design and usage changes, and more. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace by VMware, Inc.

September 12, 2013 - (Free Research)
This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management. 
(WEBCAST) READ ABSTRACT |

Best Practices for Making BYOD Simple and Secure by Citrix Systems, Inc. (E-mail this company)

March 30, 2012 - (Free Research)
This white paper presents practical guidance and best practices for using desktop virtualization, a self-service app store and secure file sharing and synchronization to deliver on-demand files, apps and desktops to any type of device, allowing organizations to leverage the full power of consumerization. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services by SearchSecurity.com

March 14, 2012 - (Free Research)
Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange by SearchSecurity.com

July 19, 2012 - (Free Research)
This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more. 
(EZINE) READ ABSTRACT |

Securing Identities and Data Across Mobile Apps by CA Technologies.

December 31, 2013 - (Free Research)
This white paper highlights the 3 major challenges in protecting user identities through mobile applications. Read on to discover a mobile gateway solution that offers secure access and user protection. 
(WHITE PAPER) READ ABSTRACT |

Network Programmability Is Real: Five Use Cases for Our Disaster Recovery Cloud Services by Cisco Systems, Inc.

February 17, 2014 - (Free Research)
This resource covers the benefits found from five use cases for a networking platform that will provide added flexibility and agility. 
(WHITE PAPER)

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

E-Book: Protecting Against Web Threats by SearchSecurity.com

December 10, 2009 - (Free Research)
Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies. 
(EBOOK) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 18, 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts