Secure WhiteWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure White returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Access Control
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Storage Security

Related Searches
 •   Construction Secure
 •   Flowchart Secure White
 •   Free Secure
 •   Media Secure
 •   Providers Secure
 •   Secure Displays
 •   Secure Paper
 •   Secure White Advertising
 •   Secure White Form
 •   Secure White North Carolina
Advertisement

ALL RESULTS
1 - 25 of 443 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Ten Best Practices for Secure Software Development by ISC2

December 15, 2010 - (Free Research)
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software. 
(WHITE PAPER) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Making Office 365 More Secure and Compliant by Dell Software

July 2012 - (Free Research)
This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool. 
(WHITE PAPER) READ ABSTRACT |

Hot Tips for Securing Your Wireless Network by Sophos, Inc.

August 2012 - (Free Research)
Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more. 
(WHITE PAPER) READ ABSTRACT |

Accelerating the deployment of a secure mobile enterprise by IBM

October 2013 - (Free Research)
In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Four Best Practices for Secure Web Access by RSA, The Security Division of EMC

June 2009 - (Free Research)
Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer Solution Saves Bank Time and Money by Linoma Software

March 2010 - (Free Research)
Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more. 
(CASE STUDY) READ ABSTRACT |

HP 3Par Secure Service Architecture by HP and Intel

February 2012 - (Free Research)
Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business. 
(WHITE PAPER) READ ABSTRACT |

Secure with Confidence: Secure Your Enterprise with zEnterprise by IBM

July 2013 - (Free Research)
Check out this exclusive white paper to find out about IBM zEnterprise System and the results of a study of customers spending patterns who have deployed it. 
(WHITE PAPER) READ ABSTRACT |

Transferring Data without Secure Protocols? by GlobalScape

May 2014 - (Free Research)
This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive. 
(WHITE PAPER) READ ABSTRACT |

Transferring Data without Secure Protocols? by IBM

May 2014 - (Free Research)
This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer in the Era of Compliance by Ipswitch WhatsUp Gold

July 2007 - (Free Research)
Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information. 
(WHITE PAPER) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs by Apani

November 2008 - (Free Research)
This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management. 
(WHITE PAPER) READ ABSTRACT |

Help Secure and certify your mobile Ecosystem by AT&T Corp

June 2011 - (Free Research)
Mobility is transforming the way we conduct business, introducing significant security considerations that require upfront planning.  Uncover suggestions on how to promote a secure mobile ecosystem as this white paper discusses security standards and considerations.   
(WHITE PAPER)

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming by VMware, Inc.

January 2012 - (Free Research)
Learn how to maximize electronic medical records (EMR) user adoption by providing fast, convenient, secure access to EMR data across multiple clients, where and when the clinician requests it. 
(WHITE PAPER) READ ABSTRACT |

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations by Cisco Systems, Inc.

February 2008 - (Free Research)
This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN. 
(WHITE PAPER) READ ABSTRACT |

The Secure Console: Browser-based, Command Line Interface, or Both? by Raritan Inc.

January 2008 - (Free Research)
With pros and cons accompanying each approach, IT decision-makers may face a difficult choice in selecting console architecture. Read this white paper to learn benefits and challenges of each as well as the capabilities that differentiate them. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 443 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts