Programs Security TechnologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Programs Security Technology returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Managed Security Services
 •   Endpoint Security
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Designers Programs Security Technology
 •   Making Programs Security
 •   On-Line Programs
 •   Programs Desktops
 •   Programs Security Guidelines
 •   Programs Security Technology Directories
 •   Programs Security Technology Internet
 •   Programs Security Technology Solution
 •   Programs Spreadsheets
 •   Test Programs Security
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.

February 08, 2011 - (Free Research)
Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches. 
(WHITE PAPER) READ ABSTRACT |

Updating Your Corporate BYOD Program for Success by Citrix

December 07, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program. 
(EGUIDE) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 27, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme? by ComputerWeekly.com

April 01, 2014 - (Free Research)
In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends by ComputerWeekly.com

August 15, 2011 - (Free Research)
In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now. 
(EBOOK) READ ABSTRACT |

5 Keys to Developing an Awareness Program by Polivec

April 25, 2008 - (Free Research)
Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 16, 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

Information Governance: Business Imperative or Technology Asset? by Iron Mountain

May 01, 2012 - (Free Research)
In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals. 
(EBRIEF) READ ABSTRACT |

Information Security Magazine September 2011—Reader’s Choice Awards by Information Security Magazine

September 01, 2011 - (Free Research)
Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access. 
(EZINE)

BYOD Security Strategies: Balancing BYOD Risks and Rewards by Citrix

September 23, 2013 - (Free Research)
This expert guide takes an in-depth look at BYOD security strategies, outlining what crucial factors you need to keep in mind and how you can ensure a successful and secure BYOD initiative. 
(EGUIDE) READ ABSTRACT |

Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

July 28, 2010 - (Free Research)
To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains. 
(WHITE PAPER) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Best Practices For Your Threat Management Program by IBM

November 26, 2013 - (Free Research)
In this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features! 
(EGUIDE) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Guernsey Improves Social Benefit Programs and Service Delivery with the Right Integrated Platform by IBM

December 31, 2013 - (Free Research)
Guernsey's Social Security Department decided to integrate all of the department's social benefit programs. In this white paper, learn how a dedicated platform helped streamline and strengthen their social program management through integration and automation. 
(WHITE PAPER) READ ABSTRACT |

Mobile Madness or BYOD Security? by Sophos, Inc.

November 01, 2013 - (Free Research)
This informative paper examines the state of BYOD today and the direction in which it's going, discussing common challenges in implementing and managing it and helpful strategies for overcoming these obstacles. 
(WHITE PAPER) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 24, 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

Symantec Report on Rogue Security Software by Symantec Corporation

October 01, 2009 - (Free Research)
The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams. 
(WHITE PAPER) READ ABSTRACT |

Considerations and Best Practices for Updating a Corporate BYOD Program by Good Technology

March 21, 2013 - (Free Research)
In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy. 
(EGUIDE) READ ABSTRACT |

Cisco IT GRC Security Assessment Service by Cisco Systems, Inc.

June 12, 2009 - (Free Research)
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies. 
(WHITE PAPER) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 27, 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends by ComputerWeekly.com

August 23, 2011 - (Free Research)
In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts