Security ConfigurationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Configuration returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Change and Configuration Management
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Endpoint Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Availability, Performance and Problem Management
 •   Managed Security Services

Related Searches
 •   Build Security Configuration
 •   Codes Security
 •   Devices Security Configuration
 •   Migration Security Configuration
 •   Products Security
 •   Security Configuration Fact
 •   Security Configuration Marketing
 •   Security Configuration Publishing
 •   Security Configuration Support
 •   Template Security Configuration
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Reinventing Branch Office Security: Configuration-less UTM protection for small offices by Astaro

July 15, 2010 - (Free Research)
When it comes to IT security, almost all businesses using IP networks to transmit data will know that they have to protect themselves, and they will have systems in place to keep their data secure. However, this is often focused at the head office. For workers that are not at the central office, the question of security is a harder one to answer. 
(WHITE PAPER) READ ABSTRACT |

White Paper: SCM: The "Blocking and Tackling" of IT Security by Tripwire, Inc.

November 10, 2011 - (Free Research)
In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices by RES Software

October 27, 2010 - (Free Research)
Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to... 
(EBOOK) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition by IBM

October 2010 - (Free Research)
In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points. 
(WHITE PAPER) READ ABSTRACT |

Overcoming virtualization security risks: Best practices by Kaspersky Lab

April 2012 - (Free Research)
Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks. 
(EGUIDE) READ ABSTRACT |

Sharepoint E-zine Vol.4: Balancing SharePoint Governance by SearchWinIT

November 2008 - (Free Research)
SharePoint has built-in features that allow site owners to create site maps without any custom coding at all. 
(EZINE)

Maintaining Continuous Compliance – a new best practice approach by IBM

July 2011 - (Free Research)
When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager. 
(WHITE PAPER) READ ABSTRACT |

Fast and Simple Disaster Recovery with BEX Bare Metal Recovery by Syncsort

August 2008 - (Free Research)
This paper introduces a new end-to-end enterprise-wide strategy for backup and recovery in the Windows, Linux, and UNIX environments. 
(WHITE PAPER) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by Citrix Systems, Inc. (E-mail this company)

March 2013 - (Free Research)
This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more. 
(EGUIDE) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

E-Guide: Exploring Configuration Changes to Reduce Attacks by Tripwire, Inc.

September 2011 - (Free Research)
Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks. 
(EGUIDE) READ ABSTRACT |

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success by Tripwire, Inc.

October 2008 - (Free Research)
As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization. 
(WHITE PAPER) READ ABSTRACT |

IT Download - Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

February 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Automating Virtual Machine Configuration by ePlus Technology

May 2009 - (Free Research)
Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Network Barometer Report 2011 by Dimension Data

June 2011 - (Free Research)
This report reviews the networks’ readiness to support business by evaluating the configuration variance from best practices, potential security vulnerabilities and end-of-life status of the included network devices. 
(ANALYST REPORT) READ ABSTRACT |

Cisco 1800 Series Integrated Services Routers Fixed Configuration Models by Cisco Systems, Inc.

The Cisco® 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, scalable delivery of mission-critical business applications. 
(HARDWARE PRODUCT)

Cisco 870 Series Integrated Services Routers for Small Offices by Cisco Systems, Inc.

Cisco 870 Series of integrated services routers are fixed-configuration routers that support multiple types of DSL technologies, broadband cable, and Metro Ethernet connections in small offices. 
(HARDWARE PRODUCT)

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts