Security DecisionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Decisions returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Managed Security Services
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Virtualization
 •   Wireless Security
 •   Application Security
 •   Security Policies
 •   Network Management
 •   Security Monitoring

Related Searches
 •   Evaluation Security
 •   Layer Security Decisions
 •   Monitoring Security Decisions
 •   Planner Security Decisions
 •   Plans Security Decisions
 •   Security Decisions Designers
 •   Security Decisions Directory
 •   Security Decisions White Papers
 •   Security Graphics
 •   Supplier Security Decisions
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 28, 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

WAN Security: Making the Right Choices for an Optimized WAN by XO Communications

April 30, 2012 - (Free Research)
This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise. 
(WEBCAST) READ ABSTRACT |

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 04, 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK) READ ABSTRACT |

Consumer Web Portals: Platforms at Significant Security Risk by EMC Corporation

December 31, 2013 - (Free Research)
This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience. 
(WHITE PAPER) READ ABSTRACT |

What to Consider when Dealing with Desktop Virtualization over the WAN by F5 Networks

October 04, 2011 - (Free Research)
Desktop virtualization deployments must be in sync with networking and security decisions to ensure an optimal user experience for WAN users. Hear what industry experts Brian Madden and Gabe Knuth have to say about specific desktop virtualization networking issues and application performance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

CW buyer's guide: context-aware security by ComputerWeekly.com

April 29, 2013 - (Free Research)
This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Presentation Transcript: The Cybercrime War; When Are We Going to Win? by Dell SecureWorks UK

August 22, 2011 - (Free Research)
Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.” 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Future of Information-Centric Security by Palisade Systems, Inc.

September 04, 2009 - (Free Research)
Read this presentation transcript to learn what speaker Rich Mogull has to say about the importance of data protection and the future of security in terms of the way security decisions and security breaches affect business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Information Security IT Decision Checklist: Security Information and Event Management by ArcSight, an HP Company

July 28, 2011 - (Free Research)
This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process. 
(EGUIDE) READ ABSTRACT |

IT Decision Checklist: Antimalware by ESET

October 27, 2011 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today. 
(EGUIDE) READ ABSTRACT |

The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business by RSA, The Security Division of EMC

March 18, 2009 - (Free Research)
This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Decisions E-Zine Feature: How mobile IT is revamping network strategies by SearchCIO.com

November 07, 2012 - (Free Research)
Inside this edition of CIO Decisions E-zine, find out how your peers are keeping up with consumerization trends. Uncover practical network management advice from the experiences of several high-profile organizations. 
(EZINE) READ ABSTRACT |

Solving Agencies’ Big Data Challenges: PED for On-the-Fly Decisions by NetApp

March 01, 2012 - (Free Research)
Check out this white paper to learn how to harness the valued intelligence from huge sets of data and learn about a storage solution designed to help turn ISR data into quality information that can be used for better decision-making. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 27, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

IT Decision Checklist: Messaging Security by SearchSecurity.com

March 03, 2010 - (Free Research)
Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both. 
(EGUIDE) READ ABSTRACT |

The Event Data Warehouse- Strategies for Improving Business Performance by Hexis Cyber Solutions Inc

July 18, 2011 - (Free Research)
Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions. 
(WHITE PAPER) READ ABSTRACT |

SenSage Security Intelligence by Hexis Cyber Solutions Inc

February 01, 2010 - (Free Research)
This white paper will teach you about a solution that can provide you with enterprise-wide protection and also provide you with decision support when it comes to security, risk management and compliance. So don't waste anytime and see why this real-time security solution could save your enterprise from a costly security breach. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 01, 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Cloud Security Insights for IT Strategic Planning by Intel

January 20, 2012 - (Free Research)
This white paper reviews the results from a survey of 200 IT professionals that can help you optimize your cloud’s security. Key findings suggest that security plays a foundational role in the decision to implement a private cloud, protecting platform and infrastructure resources are top concerns and security drives outsourcing decisions. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Fortune 100 Insurance Company and Security Weaver by Security Weaver

November 08, 2010 - (Free Research)
For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company. 
(CASE STUDY) READ ABSTRACT |

The Truth about Agent Vs. Agentless Monitorinng: A Short Guide to Choosing the Right Solution by uptime software inc.

July 1967 - (Free Research)
When selecting an enterprise-level monitoring solution, one of the first decisions the IT department needs to make is whether to opt for an agent based, or agentless monitoring solution. This paper helps you arrive at a decision. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security IT Decision Center Handbook 2 by SearchSecurity.com

November 2013 - (Free Research)
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment. 
(EGUIDE) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

IBM Infosphere Streams: Redefining Real Time Analytics by IBM

December 2010 - (Free Research)
This exclusive resource introduces a breakthrough approach to data management and analytics that can detect insights from real-time data streams, resulting in rapid decision-making and minimizing missed opportunities. 
(WHITE PAPER) READ ABSTRACT |

How MDM and the Consumerization of IT are Reshaping IT Decision-Making by SearchSecurity.com

October 2012 - (Free Research)
Access this white paper to learn why your organization needs to start integrating IT consumerization and BYOD into its business – and how to get there. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts