Reviews Chap Security PublishedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Reviews Chap Security Published returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Security
 •   Vulnerability Assessment
 •   Access Control
 •   Authentication / Password Management
 •   Security Monitoring
 •   Storage Security
 •   Endpoint Security

Related Searches
 •   Build Reviews Chap
 •   Business Reviews Chap
 •   Faqs Reviews Chap Security
 •   Firms Reviews Chap
 •   General Reviews
 •   Reviews Chap Cost
 •   Reviews Chap Security Financial
 •   Reviews Chap Security Manuals
 •   Reviews Contacts
 •   Reviews Portals
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Chapter 2: The Shortcut Guide™ to Exchange Server 2007 Storage Systems by LeftHand Networks

June 2008 - (Free Research)
This chapter reviews not only the common mistakes that are made when calculating the amount of storage required to support a group of users but also the mistakes made when calculating the I/O capacity required to support that group of users. 
(WHITE PAPER) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Introspect: Leads the Market in Streamlined Capture, Review and Production of ESI for FRCP Compliance by ZANTAZ

January 2008 - (Free Research)
ZANTAZ Introspect offers the highest level of security for your organization's discoverable data. 
(WHITE PAPER) READ ABSTRACT |

Solving the Password Management Paradox: Defining the Problem and Reviewing the Four Best-Known Solutions by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This paper discusses the paradox of strong password policies, evaluates several possible solutions, and recommends a password management solution that is cost effective and easy to implement. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Unified Storage Market Comparison: Costs, Complexity, and Block-based Capabilities by IBM

April 2012 - (Free Research)
This white paper details a combination of hands-on evaluation specifically on block-based storage features of two complete unified storage systems, reviewing relevant published documents on storage TCO. Find out which storage system delivers compelling cost savings through highly efficient management capabilities. 
(WHITE PAPER) READ ABSTRACT |

CWAT Data Loss Prevention - Whitepaper/Technical Review by Software Engineering of America, Inc.

September 2006 - (Free Research)
CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks. 
(WHITE PAPER) READ ABSTRACT |

Information Security Roles and Responsibilities Made Easy by Information Shield, Inc.

Reducing the total cost of information security services by properly documented roles and responsibilities. 
(SOFTWARE PRODUCT)

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

The Realities of Single Sign-On by PistolStar, Inc.

June 2008 - (Free Research)
Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis by Coverity

March 2008 - (Free Research)
This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2008 Backup Tool - A Review of Its Features by Global Knowledge

October 2008 - (Free Research)
This white paper presents some of the more significant pros and cons of the Server 2008 version of the backup tool that debuted in Windows Vista. 
(WHITE PAPER) READ ABSTRACT |

The High Stakes of Security: Protecting Your Brand by IBM Software Group

July 2008 - (Free Research)
This white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization... 
(WHITE PAPER) READ ABSTRACT |

Patch Tuesday Alerts by Lumension

July 2008 - (Free Research)
Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible. 
(PRESS RELEASE) READ ABSTRACT |

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation

July 2008 - (Free Research)
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance. 
(BOOK) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

July 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How to Prove, Identify and Establish Trust in E-Business by Dell Software

March 2008 - (Free Research)
This technical brief explains how you can prove the identity of the other party in an e-transaction or exchange of information and also describes why Quest’s Defender is an excellent solution to help you accomplish this. 
(WHITE PAPER) READ ABSTRACT |

Cisco ASA 5500 Series Adaptive Security Appliance by Cisco Systems, Inc.

August 2008 - (Free Research)
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts