Security ComputersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Computers returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Homeland Security
 •   Anti-Virus Solutions
 •   Security Monitoring
 •   Network Security

Related Searches
 •   Buys Security
 •   Ecommerce Security
 •   Flowchart Security Computers
 •   Record Security
 •   Security Computers Advertising
 •   Security Computers Benefit
 •   Security Computers Metrics
 •   Security Production
 •   Software Security Computers
 •   Technical Security Computers
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

A Hack Attack: Six Steps to Recovery by Cisco Systems, Inc.

January 21, 2011 - (Free Research)
It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 13 May 2014: Retail's data challenge by ComputerWeekly.com

May 12, 2014 - (Free Research)
In this week's Computer Weekly, we look at how data analytics is driving a new approach to customer relationship management within the retail sector. Customer who shops in multiple channels offer greater value to retailers. We find out how auction site eBay has developed a bespoke data analytics architecture to track every customer interaction. 
(EZINE) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Computer Forensics and its Role in the Risk Management Process by IBM

May 2011 - (Free Research)
The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies. 
(EGUIDE) READ ABSTRACT |

The Extraordinary Failure of Anti-Virus Technology by Lumension

February 2008 - (Free Research)
Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

Computer Weekly - 17 April 2012: How to ensure smartphone security by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT. 
(EZINE) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Simplifying the Scope of the PCI Audit: How Cross-Platform Server Isolation Helps Retailers Achieve Compliance by Apani

February 2008 - (Free Research)
This paper will describe how Apani EpiForce can solve key aspects of the PCI compliance challenge. Apani® EpiForce® proactively eliminates vulnerabilities within the corporate network by isolating computers and the business-critical data, personal information and intellectual property stored on them into logical security zones. 
(ARTICLE) READ ABSTRACT |

Client Management Best Practices for Managing Mac Systems by CDW

April 2010 - (Free Research)
One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

The Malware Report: Hotel Business Center PCs Strike Again by ESET

August 2009 - (Free Research)
Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely. 
(PODCAST) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

Computer Weekly 4 October 2011: Download the latest issue of the UK's leading technology publication, with our analysis of the business technology news that matters to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, transformation. Download the new issue now. 
(EZINE)

NAC: Managing Unauthorized Computers by Sophos, Inc.

February 2008 - (Free Research)
Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Sophos Computer Security Scan by Sophos, Inc.

April 2010 - (Free Research)
Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found. 
(TRIAL SOFTWARE)

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by Sophos, Inc.

June 2009 - (Free Research)
Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption. 
(WHITE PAPER) READ ABSTRACT |

Threatsaurus: The A-Z of Computer and Data Security Threats by Sophos UK

December 2009 - (Free Research)
Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language. 
(BOOK) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts