Resource Information SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Resource Information Security returned the following results.
RSS What is RSS?
Related Categories

 •   Human Capital Management
 •   Human Resource Management
 •   Recruiting, Staffing and Applicant Tracking
 •   Social Networks and Community Management
 •   Employee Performance (EPM)/ Talent Management
 •   Enterprise Information Integration/ Metadata Management
 •   Learning Management Systems (LMS)
 •   Security Policies
 •   Database Planning and Implementation
 •   Web Servers

Related Searches
 •   Concerns Resource Information Security
 •   Customer Resource Information Security
 •   Design Resource Information
 •   Practice Resource Information
 •   Resource Computers
 •   Resource Information Basics
 •   Resource Information Security Template
 •   Resource Script
 •   Resource Virginia
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

A CW buyer’s guide to Human Capital Management by ComputerWeekly.com

November 2013 - (Free Research)
Computer Weekly looks at what steps the industry has taken to improve talent management; bridging the gap between the cost savings promised by cloud technologies and the value they deliver; and how to recruit expertise in emerging technologies. 
(ESSENTIAL GUIDE) READ ABSTRACT |

A New Breed of Data Warehouse by ASG Software Solutions

February 2010 - (Free Research)
Read this paper to learn about an emerging data warehouse technology that addresses many of the implementation challenges organizations face. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine

January 2009 - (Free Research)
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it. 
(EZINE)

IBM PureFlex System Configurations by IBM

April 2012 - (Free Research)
This paper outlines the specs and details of an option that encompasses server, storage, networking and software resources. Read on to learn how these deeply integrated resources can be deployed in hours rather than days, how its optimized configurations can accelerate purchases and time to value, and so much more. 
(WHITE PAPER) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Information as if It Were Our Own by Iron Mountain

August 2012 - (Free Research)
This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now. 
(WHITE PAPER) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Protecting Sensitive Data and Resources Throughout the Organization by CA (India) Technologies Pvt. Ltd

March 2009 - (Free Research)
CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

August 2009 - (Free Research)
The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Clearswift Government Communications 2.0 by Clearswift

August 2013 - (Free Research)
In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession by Information Security Magazine

February 2009 - (Free Research)
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture. 
(EBOOK) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Cisco IT GRC Security Assessment Service by Cisco Systems, Inc.

June 2009 - (Free Research)
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies. 
(WHITE PAPER) READ ABSTRACT |

The High Stakes of Security: Protecting Your Brand by IBM Software Group

July 2008 - (Free Research)
This white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization... 
(WHITE PAPER) READ ABSTRACT |

Every Man's Guide to Combat Threats Within Your Organization by ISC2

June 2009 - (Free Research)
This eGuide highlights how mobile computing is more than just a trend, what cybersecurity experts have to say about information warfare, and what you can do to enhance team intelligence. 
(EGUIDE) READ ABSTRACT |

Enterprise Information Protection - The Impact of Big Data by IBM

March 2013 - (Free Research)
In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Protection on demand: information security that works for you - instead of putting you to work. by IBM

February 2009 - (Free Research)
Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings. 
(WHITE PAPER) READ ABSTRACT |

Unlocking Information: Digital data is a hospital’s most valuable resource by Dell, Inc.

June 2012 - (Free Research)
Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care. 
(WHITE PAPER)

Get actionable insight with security intelligence for mainframe environments by IBM

March 2013 - (Free Research)
View this white paper to learn more about the importance of alerts with enterprise security. Find out how you can deliver integrated threat analysis, real-time alerts, and audit consolidation to manage today's growing threats. This resource discusses how you can enhance security without increasing overhead. 
(WHITE PAPER) READ ABSTRACT |

Tips on Managing the Deluge of Information Security Threat Reports by SearchSecurity.com

December 2013 - (Free Research)
Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats. 
(EGUIDE) READ ABSTRACT |

Risk Management for Cloud Computing by SearchCIO.com

February 2013 - (Free Research)
This expert resource provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts