Secure CreatingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Creating returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Endpoint Security
 •   Networks
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Network Management

Related Searches
 •   Pos Secure Creating
 •   Secure Agency
 •   Secure Change
 •   Secure Creating Company
 •   Secure Creating Diagram
 •   Secure Creating Strategic
 •   Secure Creating Terminal
 •   Secure Creating Tracking
 •   Secure Protocol
 •   Secure Tennessee
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 03, 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Four Best Practices for Secure Web Access by RSA, The Security Division of EMC

June 01, 2009 - (Free Research)
Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

IBM Rational Asset Manager e-Kit by IBM

March 2009 - (Free Research)
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture. 
(PRODUCT DEMO) READ ABSTRACT |

Presentation Transcript: Strategies for Creating a Secure and Flexible Hybrid Cloud Environment by Layered Tech

April 2010 - (Free Research)
This transcript of the "Strategies for Creating a Secure and Flexible Hybrid Cloud Environment" webcast explores the trend toward hybrid cloud computing. Gain insight into how it integrates the benefits of both virtualization and dedicated servers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Endpoint Security: Visible Coverage in a Single, Scalable Platform by Trend Micro, Inc.

January 2009 - (Free Research)
Read this brief data sheet to learn how Trend Micro's Endpoint Security Platform delivers pervasive visibility and control, speeds time to protection, and increases management efficiency. 
(DATA SHEET) READ ABSTRACT |

How to create inherently secure communications by ComputerWeekly.com

November 2010 - (Free Research)
In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. 
(WHITE PAPER) READ ABSTRACT |

EXA Corporation Creates a Secure and Resilient Private Cloud by IBM

June 2012 - (Free Research)
In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers. 
(WHITE PAPER) READ ABSTRACT |

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

October 2010 - (Free Research)
Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

Securing Business Communications Applications in Converged Networks - Best Practices by Avaya Inc.

June 2008 - (Free Research)
Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic. 
(WHITE PAPER) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: Total Protection for Secure Business by McAfee, Inc.

September 2009 - (Free Research)
Total Protection for Secure Business. Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Symantec Protection Suite Enterprise Edition by Symantec Corporation

June 2009 - (Free Research)
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure. 
(TRIAL SOFTWARE)

Secure Remote Access your Users will Love by Citrix

January 2014 - (Free Research)
This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose. 
(WHITE PAPER) READ ABSTRACT |

Fast, Secure Apps for Remote Engineers by Dell, Inc. and Intel®

February 2014 - (Free Research)
This case-study explains how a large-scale, global research and engineering organization used VDI to centralize their infrastructure in order to provide seamless and secure access to high-performance apps, including intensive electronic design automation (EDA) applications. 
(WHITE PAPER) READ ABSTRACT |

The Ten Commandments of Bring Your Own Device by IBM

May 2014 - (Free Research)
This white paper sets out to help you find that balance with the "10 commandments" of BYOD. Read now for 10 tips to creating a secure, productive, and satisfying mobile workplace. 
(WHITE PAPER) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualized Data Centers by Trend Micro, Inc.

December 2009 - (Free Research)
On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Challenges of Securing a Smarter Planet by IBM

December 2010 - (Free Research)
In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Consolidate Storage Infrastructure and Create a Greener Datacenter by Oracle Corporation

April 2010 - (Free Research)
Read this paper to learn how to find ways to cope with an expanding storage infrastructure, as well as provide continuous access to data stored on reliable and secure media, meet stringent compliance regulations and create operational efficiency while simultaneously cutting costs. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

Creating a Network Endpoint Security Policy for Hostile Endpoints by SearchSecurity.com

February 2013 - (Free Research)
Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts