Security And MethodologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security And Methodology returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Application Security
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Storage Security
 •   Embedded Application Development
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Canada Security
 •   Computer Security And
 •   Industry Security
 •   Policy Security And Methodology
 •   Security And Construction
 •   Security And Methodology Delaware
 •   Security Computer
 •   Security Notes
 •   What Is Security And
 •   Wireless Security And
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 25, 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 25, 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 09, 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 11, 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Virtualization and Backup: Advances in Technology and Lessons Learned by Early Adopters – Presentation Transcript by EqualLogic, Inc.

March 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz traces the role of backup in virtual environments, starting with the early adopters and moving to today's top backup methodologies. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and backup: Technology advances and lessons learned by early adopters by EqualLogic, Inc.

February 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz traces the role of backup in virtual environments, starting with the early adopters and moving to today's top backup methodologies. 
(WEBCAST) READ ABSTRACT |

Backup and Recovery: The Benefits of Multiple De-duplication Policies by Quantum Corporation

October 2008 - (Free Research)
This white paper explains the differences between the de-duplication approaches, discusses the strengths and limitations of each, shows how different backup tasks are likely to benefit from them, and talks about the business benefits. 
(WHITE PAPER) READ ABSTRACT |

The Agile Project Manager by VersionOne Inc.

June 2009 - (Free Research)
This white paper will explore the impact agile development methodologies are having on the Project Management community, what new skills are required, and what the Project Manager can do to ease the transition. 
(WHITE PAPER) READ ABSTRACT |

Guidance for Calculation of Efficiency (PUE) in Real Data Centers by APC by Schneider Electric

January 2010 - (Free Research)
Unfortunately, commonly published efficiency data is not computed using a standard methodology making it difficult to properly benchmark infrastructure efficiency in data centers. This paper explains the problem and describes a standardized method for classifying data center loads for efficiency calculations. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Solutions Provider Improves Productivity with Flexible Implementation Methodology by Microsoft

June 2007 - (Free Research)
Stanley Stuart Yoffee & Hendrix, Inc. (SSYH), a Microsoft® Gold Certified Partner based in Florida, implements software solutions utilizing the Microsoft family of products. With large-scale projects across varied industries, the company turned to the Microsoft Dynamics™ Sure Step Methodology to help communicate with customers... 
(CASE STUDY) READ ABSTRACT |

Solution Spotlight: A Guide to Agile Testing for QA and Test Managers by IBM

December 2012 - (Free Research)
In this expert e-guide, Lisa Crispin, co-author of the book Agile Testing explains why a testing taxonomy such as the Agile testing quadrants can be a highly effective tool to help with these uncertainties. Read on to learn how the quadrants work and how they can be applied in your organization. 
(EGUIDE) READ ABSTRACT |

BYOD: Policy Creation and it's Increasingly Growing Need by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy. 
(EGUIDE) READ ABSTRACT |

IBM Security Services: Achieving HIPAA Compliance by IBM

July 2011 - (Free Research)
This whitepaper discusses how IBM Security Services offer methodologies to help organizations achieve HIPAA compliance. 
(DATA SHEET) READ ABSTRACT |

A Six-Step Plan for Competitive Device Evaluations by Ixia

December 2013 - (Free Research)
Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Practical Implementation of BPM & SOA, Part II by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes. Discussed here is methodology, best practices and experiences. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You by Aladdin Knowledge Systems

August 2008 - (Free Research)
This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection. 
(WHITE PAPER) READ ABSTRACT |

Implementing Cloud Storage Metrics to Improve Efficiency by Intel

October 2011 - (Free Research)
Access this resource to learn about a storage metrics methodology that can expand to both the private cloud and traditional enterprise environments. 
(WHITE PAPER) READ ABSTRACT |

Merging Backup and Disaster Recovery (DR) Processes by FalconStor Software

April 2011 - (Free Research)
This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments. 
(WHITE PAPER) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Threat Management: Devising a new strategy to tackle today's cyberattacks by SearchSecurity.com

May 2012 - (Free Research)
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security by Faronics

January 2010 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How Application Whitelisting Can Increase Your Desktop Security by Faronics

November 2009 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts