Security Softwares For ParentsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Softwares For Parents returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Security
 •   Managed Security Services
 •   Application Security
 •   Security Policies
 •   Network Security
 •   Endpoint Security
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Designing Security
 •   Guideline Security Softwares For
 •   Own Security Softwares For
 •   Print Security Softwares
 •   Security Procedure
 •   Security Softwares Features
 •   Security Softwares For Consults
 •   Security Softwares For Introduction
 •   Security Softwares For Manufacturing
 •   Spreadsheets Security
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 16, 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 17, 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

This Month in the Threat Webscape for October 2009 by Websense, Inc.

November 10, 2009 - (Free Research)
The Websense Security Labs Threatscape delivers information about breaking security research topics and today's advanced Internet threats. This Month's 'In the Threatscape' is a review of October's Web threat activity. Watch the video to learn more. 
(VIDEO) READ ABSTRACT |

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner by Perimeter eSecurity

November 03, 2011 - (Free Research)
Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter. 
(CASE STUDY) READ ABSTRACT |

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data by AvePoint, Inc.

February 04, 2010 - (Free Research)
Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment. 
(CASE STUDY) READ ABSTRACT |

Implementing a Secure Wireless Network in an Educational Setting by NETGEAR Inc.

October 11, 2010 - (Free Research)
Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more.  
(WHITE PAPER) READ ABSTRACT |

School Bus Operator Drives Competitive Advantage with Blackberry Solution by BlackBerry

February 25, 2009 - (Free Research)
Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone. 
(CASE STUDY) READ ABSTRACT |

Identity and Access Management (IAM) Across Cloud and On-Premise Environments Best Practices for Maintaining Security and Control by CA Technologies.

July 11, 2013 - (Free Research)
This informative white paper provides some best practices for maintaining security and control throughout hybrid cloud environments. 
(WHITE PAPER) READ ABSTRACT |

What Works in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization by FireEye

March 06, 2014 - (Free Research)
Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security. 
(WHITE PAPER) READ ABSTRACT |

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments by FireEye

December 31, 2013 - (Free Research)
In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks. 
(WHITE PAPER) READ ABSTRACT |

Big Threats for Small Businesses by FireEye

December 31, 2013 - (Free Research)
Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses. 
(WHITE PAPER) READ ABSTRACT |

On the Safe Side: Managing Security in Mobile Apps by SearchSoftwareQuality.com

April 29, 2013 - (Free Research)
This expert three-part guide provides you with all you need to know about ensuring the security of your mobile enterprise applications.  Continue on the get advice from the pros on topics such as: 7 most important security measures for enterprise data, advice on securing mobile apps, key security mistakes mobile developers make, and more. 
(EBOOK) READ ABSTRACT |

The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks by FireEye

December 31, 2013 - (Free Research)
The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization. 
(WHITE PAPER) READ ABSTRACT |

The 10 “Must-Haves” for Secure Enterprise Mobility by Citrix

February 28, 2013 - (Free Research)
This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility. 
(WHITE PAPER) READ ABSTRACT |

Meeting Threats in Real-Time: Strategies for Enhanced SIEM by LogRhythm, Inc.

October 10, 2013 - (Free Research)
Access this resource for in-depth information about the need for more effective security information and event management (SIEM) due to the increasing number of advanced persistent threats (APTs) organizations face. 
(WHITE PAPER) READ ABSTRACT |

Affinity Credit Union chooses HP Fortify on Demand - Cloud-based security assessment service for mobile remote deposit capture application by Hewlett-Packard Limited

November 01, 2013 - (Free Research)
This resource shows the benefits associated with cloud-based security assessment services and how you can apply them to your business. 
(CASE STUDY) READ ABSTRACT |

Securing Cloud Computing For Enterprise Collaboration by IntraLinks, Inc

April 21, 2014 - (Free Research)
Consult the following white paper to explore the current state of security in the cloud as well as what you need to look for when selecting an appropriate vendor for your business. Learn about the 4 security areas that need to be covered, tips for getting info from service providers, security check lists, and more. 
(WHITE PAPER) READ ABSTRACT |

Legal Issues of Cloud Forensics by Global Knowledge

April 11, 2013 - (Free Research)
This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud. 
(WHITE PAPER) READ ABSTRACT |

Keep Cloud Compliant by SearchCompliance.com

September 23, 2013 - (Free Research)
Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines. 
(EBOOK) READ ABSTRACT |

Simplify SSL Certificate Management Across the Enterprise by Symantec Corporation

May 07, 2012 - (Free Research)
Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Delivering Enterprise Mobility by Citrix Systems, Inc. (E-mail this company)

October 15, 2013 - (Free Research)
This exclusive white paper discusses a set of mobile tools from industry titan Citrix that provide a complete, integrated and scalable solution to deliver applications and data to any device with full security and a high-performance user experience. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence to Protect Sensitive Healthcare Data by IBM

December 31, 2013 - (Free Research)
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Mobile Device Protection and Security by Druva Software

February 12, 2014 - (Free Research)
Explore this expert e-guide to find best practices for mobile data security, four approaches to mobile data protection and a variety of security options for CIOs. 
(EGUIDE) READ ABSTRACT |

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by SearchSecurity.com

February 11, 2013 - (Free Research)
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts