Secure SystemsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Systems returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Managed Security Services
 •   Virtualization
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy
 •   Managed Service Provider (MSP)

Related Searches
 •   Case Secure Systems
 •   Comparing Secure
 •   Construction Secure
 •   Electronic Secure Systems
 •   Faq Secure Systems
 •   New Secure Systems
 •   Secure Definitions
 •   Secure Prices
 •   Secure Systems Part
 •   Techniques Secure Systems
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Secure File Transfer Solution Saves Bank Time and Money by Linoma Software

March 24, 2010 - (Free Research)
Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more. 
(CASE STUDY) READ ABSTRACT |

SSA Goes on the Offensive against Viruses by Bytware, Inc.

February 01, 2005 - (Free Research)
This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems. 
(WHITE PAPER) READ ABSTRACT |

Overview: Comprehensive Security Intelligence Platform by IBM

December 23, 2013 - (Free Research)
Security management is a top priority of every IT department, but unfortunately these processes are growing more and more complex each day. This guide explores the importance of comprehensive security strategies and how it can smooth businesses processes while ensuring a secure system. 
(WHITE PAPER) READ ABSTRACT |

How to tackle Enterprise Information Protection & Control by ComputerWeekly.com

November 09, 2010 - (Free Research)
Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM). 
(WHITE PAPER) READ ABSTRACT |

Security Practices for Vmware by Vyatta Inc.

June 20, 2012 - (Free Research)
This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems. 
(WEBCAST) READ ABSTRACT |

Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC

May 17, 2009 - (Free Research)
Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant. 
(CASE STUDY) READ ABSTRACT |

Taking the Next Step: How to Achieve Breakthrough Success in the IT Managed Services Business by Kaseya

April 12, 2011 - (Free Research)
The drive to build a company from the ground up and offer a competitive product or service that fulfills a need is a powerful pull. Owners of IT service provider businesses are no different. Check out this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

McAfee 15 Minutes to a Secure Business: Daily Security Practices by McAfee, Inc.

November 2009 - (Free Research)
This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Securing the Administration of Virtualization by RSA, The Security Division of EMC

March 2010 - (Free Research)
In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization. 
(ANALYST REPORT) READ ABSTRACT |

Securing Business Communications Applications in Converged Networks - Best Practices by Avaya Inc.

June 2008 - (Free Research)
Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

The Ten Best Practices for Secure Software Development by ISC2

December 2010 - (Free Research)
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Hot Tips for Securing Your Wireless Network by Sophos, Inc.

August 2012 - (Free Research)
Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more. 
(WHITE PAPER) READ ABSTRACT |

Effectively Securing Virtualized Data Centers by Apani

November 2008 - (Free Research)
This white paper will examine trends in server virtualization security and reveal the many compelling advantages of cross-platform VM isolation solutions. 
(WHITE PAPER) READ ABSTRACT |

From Secure Virtualization to Secure Private Cloud by VMware, Inc.

February 2012 - (Free Research)
The way in which enterprises provision and deliver security services must evolve in order to secure private cloud computing.  This paper explores the subject of security as enterprises move beyond virtualizing their data centers to build private cloud-computing infrastructures and outlines the foundational capabilities that are required. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Remote Access Solution by Cisco Systems, Inc.

July 2008 - (Free Research)
This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources. 
(DEMO) READ ABSTRACT |

Cisco Small Business 100 Series Secure Broadband Routers by Cisco Systems, Inc.

The Cisco® Small Business Series of secure broadband routers addresses the needs of small businesses, providing affordable, easy-to-use, and secure broadband access for data-only applications. 
(HARDWARE PRODUCT)

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle by IBM

July 2009 - (Free Research)
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

HP 3Par Secure Service Architecture by HP and Intel

February 2012 - (Free Research)
Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts