Security AgencyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Agency returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   Homeland Security
 •   Storage Security
 •   Storage Management
 •   Managed Security Services
 •   Application Security

Related Searches
 •   Practice Security Agency
 •   Security Agency Compliance
 •   Security Agency Guidelines
 •   Security Agency List
 •   Security Agency Net
 •   Security Agency Program
 •   Security Faq
 •   Security Operating
 •   Skills Security Agency
Advertisement

ALL RESULTS
1 - 25 of 489 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

Legal briefing: The Draft EU General Data Protection Regulation by ComputerWeekly.com

January 28, 2014 - (Free Research)
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration by IntraLinks, Inc

April 17, 2014 - (Free Research)
This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data. 
(WHITE PAPER) READ ABSTRACT |

SANS Survey: 20 Critical Security Controls by IBM

June 30, 2013 - (Free Research)
This SANS report explores the execution of Critical Security Controls (CSCs) and how organizations have responded thus far. Read on to learn more about its implications on the future of security controls. 
(WHITE PAPER) READ ABSTRACT |

Business Information E-Zine: NoSQL Makes its Mark by SearchBusinessAnalytics

April 04, 2014 - (Free Research)
In this issue, we drill down on the facts of NoSQL databases, tapping into the experiences of savvy startups and other companies whose needs led them to NoSQL technologies. But is NoSQL right for you? Companies with fast-growing vaults of Web, social media, demographic and machine data should pay attention. IT experts chime in with timely advice. 
(EZINE) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Modern Cyber Threats and Government Agencies by M86 Security

November 2011 - (Free Research)
View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more. 
(WHITE PAPER) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing—the Path to Increased Efficiencies and Cost Savings for Government Agencies by NetApp

August 2013 - (Free Research)
Discover how NetApp is addressing the challenges of government agencies moving to private, public and hybrid cloud models with a shared storage infrastructure. Read this informative paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Swedish Social Insurance Agency DoesBYOD Right by McAfee, Inc.

August 2013 - (Free Research)
This informative case study details how a Swedish government insurance agency was able to deliver a BYOD solution that maintains strict security criteria, is clientless and is simple to manage, enabling the flexibility users demand without sacrificing security. 
(CASE STUDY) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

February 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud by IBM

August 2010 - (Free Research)
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more. 
(TECHNICAL ARTICLE)

Taking the fear out of bringing Government Systems online by IBM

July 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives by IBM

January 2011 - (Free Research)
When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes. 
(WHITE PAPER) READ ABSTRACT |

Solving Agencies’ Big Data Challenges: PED for On-the-Fly Decisions by NetApp

March 2012 - (Free Research)
Check out this white paper to learn how to harness the valued intelligence from huge sets of data and learn about a storage solution designed to help turn ISR data into quality information that can be used for better decision-making. 
(WHITE PAPER) READ ABSTRACT |

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation by IBM

December 2013 - (Free Research)
This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems. 
(WHITE PAPER) READ ABSTRACT |

Social Security Administration Deploys DocAve to Protect Mission-Critical SharePoint Deployment by AvePoint, Inc.

February 2010 - (Free Research)
In early 2008, the Social Security administration they deployed their pilot SharePoint deployment that was accessible to all agency staff. After evaluating several backup solutions, SSA administrators chose AvePoint Doc Ave Backup and Recovery for their SharePoint environment. Read this case study to learn why. 
(CASE STUDY) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies by Embarcadero Technologies, Inc.

March 2009 - (Free Research)
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies. 
(WHITE PAPER) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Government Agencies by IBM

March 2013 - (Free Research)
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 489 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts