Secure LatestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Latest returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Endpoint Security
 •   Virtualization
 •   Wireless Security
 •   Anti-Virus Solutions
 •   Data Center Management

Related Searches
 •   Need Secure Latest
 •   Needs Secure Latest
 •   Search Secure Latest
 •   Secure Fast
 •   Secure Hardware Provider
 •   Secure Latest Assessment
 •   Secure Latest Contact
 •   Secure Latest Internet
 •   Secure Payment
 •   Types Secure
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Safe & Secure: An Overview of Security Features In JBoss Application Platforms by Red Hat

July 08, 2010 - (Free Research)
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle. 
(WEBCAST) READ ABSTRACT |

Latest IT Trends For Secure Mobile Collaboration by Cisco (E-mail this company)

September 30, 2013 - (Free Research)
This informative whitepaper explores some of the latest IT trends for secure mobile collaboration, and outlines how you can situate your network infrastructure for smooth deployment. 
(WHITE PAPER) READ ABSTRACT |

IBM X-Force 2010 Trend and Risk Report by IBM

May 23, 2011 - (Free Research)
This IBM X-Force offers latest security trends to help you better understand how to protect your systems and networks and offers ways to improve your security strategy. Read this report for an overview of latest security threats and how to detect them, operate a secure infrastructure, develop secure software, and more. 
(ANALYST REPORT) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 28, 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Customer Spotlight: The Journey to Fast EMR Access via VMware View “Follow me” Desktops and Walk-Away Security by Imprivata

January 27, 2011 - (Free Research)
Learn about Memorial Healthcare’s latest approach to ensure that its clinicians have fast and secure access to critical patient information. You will learn about secure “follow me” desktops to provide doctors and nurses with patient information at their fingertips - from any workstation or personal device. 
(WEBCAST) READ ABSTRACT |

Fast, Secure Apps for Remote Engineers by Dell, Inc.

December 31, 2012 - (Free Research)
Access this exclusive case study to find out how a semiconductor organization achieved their IT goals by deploying a virtualized Linux desktop infrastructure built on Dell servers. 
(CASE STUDY) READ ABSTRACT |

Latest IT Trends For Secure Mobile Collaboration by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This guide explores the current state of workplace mobility, BYOD and what you can do to ensure security for user-devices. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It by Sophos, Inc.

February 03, 2010 - (Free Research)
Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Secure Mobile Collaboration by Cisco Systems, Inc.

January 22, 2014 - (Free Research)
Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile. 
(WHITE PAPER) READ ABSTRACT |

Can You Have Your Cloud and Be Secure Too? You Can by CA Technologies.

December 02, 2011 - (Free Research)
Can you have your cloud and be secure too? Yes, you can! Read this white paper to learn about the latest cloud security services that allow you to effectively address concerns regarding identity, access control, and auditing while providing elasticity and agility. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – March 2014 by SearchSecurity.com

March 03, 2014 - (Free Research)
In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation. 
(EZINE) READ ABSTRACT |

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by Webroot

December 01, 2010 - (Free Research)
This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs. 
(WHITE PAPER) READ ABSTRACT |

New E-Guide: Securing and Consolidating Remote and Branch Offices by Brocade

September 01, 2007 - (Free Research)
The remote office/branch office (ROBO) is now a main part of many organizations' storage initiatives. This eGuide, featuring articles from Storage magazine, outlines the issues of protecting ROBO data and provides insight and strategies for... 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: How Vulnerable is Your Backup Media? by Iron Mountain

March 2012 - (Free Research)
Check out this white paper for tips to help you securely manage backup and recovery processes. Discover the importance of developing a chain of custody when it comes to data, learn how authorization and access restrictions can help keep your information secure, and receive best practices for choosing an offsite data backup/protection partner. 
(WHITE PAPER) READ ABSTRACT |

Migrating to Windows 7: How to Select a Provider for PC Online Backup and Recovery by Iron Mountain

January 2011 - (Free Research)
In addition to implementing strategic initiatives, IT has the basic function of keeping workers productive. With many enterprises migrating to Microsoft Windows 7, it is important to consider a backup provider that supports Microsoft’s latest platform. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Survival Guide: Securing Networks without Borders Show by Cisco Systems, Inc.

November 2009 - (Free Research)
In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them 
(WEBCAST) READ ABSTRACT |

Securing End-User Mobile Devices in the Enterprise by IBM

August 2011 - (Free Research)
As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Evaluating Email Security Solutions by SonicWALL

April 2008 - (Free Research)
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 15 November 2011: Read this week's issue of the UK's leading technology publication, with all the latest news, analysis and opinion for IT managers by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now. 
(EZINE)

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by AVG Technologies USA, Inc.

March 2010 - (Free Research)
The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs. 
(CASE STUDY) READ ABSTRACT |

Webroot Secure Anywhere - Endpoint Protection by Webroot

August 2012 - (Free Research)
Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective. 
(WHITE PAPER) READ ABSTRACT |

LTO Tape Technology Continues to Evolve with LTO-5 by Overland Storage

May 2010 - (Free Research)
Read this FAQ featuring W. Curtis Preston, which outlines how Linear Tape-Open (LTO) tape differs from other tape media, the various generations of LTO and the pros and cons of this backup technology. Also learn about the newest model, LTO-5, being released this year. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts