Security Assessment Podcast WarehouseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Assessment Podcast Warehouse returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Vulnerability Assessment
 •   Security Policies
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Data Warehousing
 •   Application Security
 •   Managed Security Services
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Demo Security Assessment Podcast
 •   Downloads Security Assessment Podcast
 •   Implementation Of Security Assessment
 •   Introduction Security
 •   Networking Security Assessment
 •   Security Assessment Podcast Standard
 •   Security Assessment Suite
 •   Security Benefits
 •   Security Demonstrations
 •   Trend Security
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Application Security Assessment Options by Security Innovation

December 03, 2010 - (Free Research)
This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems. 
(EGUIDE) READ ABSTRACT |

Web-facing applications: Security assessment tools and strategies by SearchSecurity.com

October 08, 2012 - (Free Research)
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Acquire a global view of your organization's security state: the importance of security assessments by IBM Software Group

January 11, 2008 - (Free Research)
Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes by IBM

August 24, 2011 - (Free Research)
This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements. 
(EGUIDE) READ ABSTRACT |

Cisco IT GRC Security Assessment Service by Cisco Systems, Inc.

June 12, 2009 - (Free Research)
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security Trends Report Q3-Q4, 2008 by Cenzic

May 20, 2009 - (Free Research)
Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers. 
(WHITE PAPER) READ ABSTRACT |

Network Security Technologies Technical Guide by SearchSecurity.com

December 31, 2012 - (Free Research)
Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more. 
(WHITE PAPER) READ ABSTRACT |

Affinity Credit Union chooses HP Fortify on Demand - Cloud-based security assessment service for mobile remote deposit capture application by Hewlett-Packard Limited

November 01, 2013 - (Free Research)
This resource shows the benefits associated with cloud-based security assessment services and how you can apply them to your business. 
(CASE STUDY) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Rainbow Technologies Authentication eBook by SafeNet, Inc.

March 25, 2002 - (Free Research)
Understanding authentication/identity management should be the start of your company's security assessment. 
(BOOK) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7 by Intel

July 25, 2010 - (Free Research)
Read this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features. 
(IT BRIEFING)

Beating Web Application Security Threats by Thawte Inc.

March 18, 2010 - (Free Research)
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. 
(EBOOK) READ ABSTRACT |

Online Data Warehousing Assessment Tool by Oracle Corporation

October 01, 2010 - (Free Research)
This tool offers you a better understanding of your organization’s ability to manage growing volumes of information. It only takes a few minutes to answer these questions and receive your score. Try it now. 
(ASSESSMENT TOOL) READ ABSTRACT |

Podcast: From Data Warehousing to Insights - Enterprise Analytics by IBM

July 14, 2011 - (Free Research)
This podcast reaveals how employing a data warehousing and analytical appliance can provide the speed and functionality to enable CIOs and their teams to create value from big data. 
(PODCAST) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 12, 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

Podcast: Oracle Database 11g Release 2 - Database Innovation by Oracle Corporation

April 15, 2010 - (Free Research)
Join us in this informative podcast as Ian Abramson, President of the International Oracle Users Group, shares his thoughts on Oracle's latest database innovation - the 11g Release 2 - and discusses the numerous opportunities for better performance and simpler management that will allow companies to better optimize their IT investments. 
(PODCAST) READ ABSTRACT |

Warehousing Podcast Series by IBM

March 17, 2011 - (Free Research)
Listen to a series of short podcasts available for InfoSphere Warehousing and IBM Smart Analytics System to learn about all the benefits of the IBM approach. 
(PODCAST) READ ABSTRACT |

Apache Hadoop* Framework Spotlight: Apache Hive* Podcast by Intel

May 30, 2013 - (Free Research)
In this podcast, learn how Apache Hive is impacting the Hadoop community. Discover Hive's components and capabilities, whether Hive is a viable substitute for the existing warehouse infrastructure, the limitations of this tool, and more. 
(PODCAST) READ ABSTRACT |

Application Security Viewpoint by Ounce Labs, an IBM Company

February 03, 2010 - (Free Research)
Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them. 
(PODCAST) READ ABSTRACT |

Business Information University: Hadoop and NoSQL Integration Strategies by SearchDataManagement

December 04, 2013 - (Free Research)
In this virtual classroom, IT, data warehouse, business intelligence and analytics professionals as well as business executives will find insight and practical advice on integrating Hadoop and NoSQL big data systems into corporate data warehousing environments. 
(VIDEOCAST) READ ABSTRACT |

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape by ESET

December 02, 2010 - (Free Research)
In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more.  
(PODCAST) READ ABSTRACT |

Spam Is Annoying. Targeted Attacks Are Deadly by Tripwire, Inc.

March 29, 2013 - (Free Research)
Join renowned security author Mike Cobb in this podcast as he shares valuable information regarding targeted attacks, including how they work, who's vulnerable, and how to defend yourself properly. 
(PODCAST) READ ABSTRACT |

The Malware Report: Hotel Business Center PCs Strike Again by ESET

August 20, 2009 - (Free Research)
Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely. 
(PODCAST) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle by Guardium, an IBM Company

February 12, 2010 - (Free Research)
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts