Quality Policy SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Quality Policy Security returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Data Quality
 •   WAN/ LAN Solutions
 •   Networks
 •   Business Process Management (BPM)
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Check Quality Policy Security
 •   Conference Quality
 •   Layer Quality Policy
 •   Need Quality Policy Security
 •   Quality Billing
 •   Quality Policy Security Consultant
 •   Quality Policy Security Documents
 •   Quality Questions
 •   Report Quality Policy Security
 •   Secure Quality
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You by Insight

May 06, 2013 - (Free Research)
Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more. 
(WHITE PAPER) READ ABSTRACT |

Hackers, Hacking, and CEHv8 by Global Knowledge

January 21, 2014 - (Free Research)
This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Bringing Order to the Chaos of “Bring Your Own Device” by Enterasys

April 30, 2012 - (Free Research)
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 01, 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Enforcing IT Change Management Policy by Tripwire, Inc.

March 18, 2009 - (Free Research)
Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Media Conversion in Video Security and Surveillance Systems by Transition Networks, Inc.

September 2008 - (Free Research)
This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice. 
(WHITE PAPER) READ ABSTRACT |

Economic & Productivity Impact of IT Security on Healthcare - Video by Imprivata

May 2013 - (Free Research)
View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations. 
(WEBCAST) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

5 Keys to Developing an Awareness Program by Polivec

April 2008 - (Free Research)
Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program. 
(WEBCAST) READ ABSTRACT |

Information Governance for Business Value by IBM

August 2013 - (Free Research)
In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy. 
(EGUIDE) READ ABSTRACT |

Cisco CleanAir Technology by Cisco Systems, Inc.

March 2012 - (Free Research)
Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience. 
(WEBCAST) READ ABSTRACT |

The Financial Benefit of Cisco’s Elastic Core by Cisco Systems, Inc.

December 2012 - (Free Research)
Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services. 
(WHITE PAPER) READ ABSTRACT |

Data stewardship program: Quality booster, but a hard step for many by SAP America, Inc.

December 2012 - (Free Research)
Data stewards are central to the success of data governance programs. Without data stewards to facilitate the communications about data issues between IT and the business side, diverging data definitions, policies and quality controls can easily get out of control. This e-guide offers tips and best practices. 
(EGUIDE) READ ABSTRACT |

Oracle Identity Analytics- A Business Perspective by Oracle Corporation

February 2010 - (Free Research)
This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Oracle Data Guard with Oracle Database 11g Release 2 by Oracle Corporation UK Ltd

September 2009 - (Free Research)
Read this white paper to learn about a unique data protection and recovery solution that provides the management, monitoring, and automation software to create synchronized standby databases that protect data from failures and other disasters. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: Managing the WAN to Optimize Business by BlueCoat

April 2011 - (Free Research)
Bandwidth management is a common technique employed by IT organizations to improve quality of service over the WAN. It typically involves assigning guaranteed levels of bandwidth and traffic prioritization to improve application performance. 
(WHITE PAPER) READ ABSTRACT |

Seven Steps to Effective Data Governance by Information Builders

August 2012 - (Free Research)
Effective data governance can provide the peace of mind that your data will stand up to privacy policies, regulatory compliance, and financial reporting. Yet most organizations become overwhelmed by the undertaking and halt implementation. Read this paper to learn 7 practical steps to crafting a productive data governance plan today. 
(WHITE PAPER) READ ABSTRACT |

Focused IT Compliance at Barnabas Health by Symantec Corporation

April 2014 - (Free Research)
In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management. 
(WEBCAST) READ ABSTRACT |

Making the Right Move to a Managed Service Provider for SSL VPN by MegaPath Inc.

March 2010 - (Free Research)
Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity. 
(WHITE PAPER) READ ABSTRACT |

Cisco 870 Series Integrated Services Routers for Small Offices by Cisco Systems, Inc.

Cisco 870 Series of integrated services routers are fixed-configuration routers that support multiple types of DSL technologies, broadband cable, and Metro Ethernet connections in small offices. 
(HARDWARE PRODUCT)

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts