Security Department LearningWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Department Learning returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Security Monitoring
 •   Endpoint Security
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   Application Security
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Management

Related Searches
 •   Directories Security Department Learning
 •   Form Security
 •   Management Security Department
 •   Manager Security
 •   Office Security Department Learning
 •   Planner Security Department
 •   Security Department Customers
 •   Security Department Intrastructures
 •   Security Department Learning Info
 •   Security Department Learning Net
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Ties That Bind by SearchCIO.com

February 10, 2014 - (Free Research)
Enterprise compliance and security departments should work together to achieve business goals. Find out how this tandem can battle the regulatory and IT threat landscape. 
(EGUIDE) READ ABSTRACT |

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards by Zebra Technologies

March 22, 2011 - (Free Research)
Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies. 
(WHITE PAPER) READ ABSTRACT |

Unified Content Security in Practice by Websense, Inc.

May 03, 2011 - (Free Research)
Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention. 
(WHITE PAPER) READ ABSTRACT |

Improving Security with GRC Best Practices by TechTarget

April 18, 2014 - (Free Research)
Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices. 
(RESOURCE) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

Why You Need an Infrastructure Provider - The Top 10 Things to Look For When Choosing One by Verio

January 2010 - (Free Research)
Read this whitepaper to learn the benefits of outsourcing to infrastructure providers in today's competitive environment that can deliver solutions that meet the new demands of IT departments. Here are 10 things to look for when seeking out that provider. 
(WHITE PAPER) READ ABSTRACT |

Understanding Big Data and Security by Hewlett-Packard Limited

April 2013 - (Free Research)
This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility. 
(WEBCAST) READ ABSTRACT |

Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure by HyTrust

July 2011 - (Free Research)
To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

A World-class Pediatric Medical Center by IBM

December 2013 - (Free Research)
As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management. 
(WHITE PAPER) READ ABSTRACT |

Ten Ways the IT Department Enables Cybercrime by Kaspersky Lab

February 2011 - (Free Research)
In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them. 
(WHITE PAPER) READ ABSTRACT |

Tucson Police Department Moves To Digital Imaging With Linear Systems And LSI 3ware RAID Controllers by LSI Corporation.

September 2009 - (Free Research)
When the Tucson Police Department decided to equip its crime scene specialists with digital cameras, it chose Linear Systems Enterprise DIMS ImageServer for the ID Section’s server and storage needs. For its RAID protection, Linear Systems chose the LSI 3ware 9650SE controller card. Read on to find out the amazing results. 
(CASE STUDY) READ ABSTRACT |

How to Improve Migrations with User and Desktop Virtualization by AppSense

July 2013 - (Free Research)
Watch this quick video to learn how user and desktop virtualization can not only help make Windows 7 migration simpler, but can make management easier for your IT department while creating a much better user experience. 
(VIDEO) READ ABSTRACT |

Enterprise mobility management: Embracing BYOD through secure app and data delivery by Citrix

February 2013 - (Free Research)
Access this resource to learn more about enterprise mobility management (EMM), a mobile approach that allows IT to manage not only mobile devices themselves, but the applications and data present on them. Read on and learn about EMMs increasingly central role in the new era of IT. 
(WHITE PAPER) READ ABSTRACT |

The Right Network: Delivering Business Value for the Future by Cisco Systems, Inc.

December 2011 - (Free Research)
IT departments of midsize companies are challenged by tightened budgets and the increasing pace of technology. Ensuring you have the correct technology to meet the demands of today and tomorrow is a necessity. 
(WHITE PAPER) READ ABSTRACT |

What IT Managers Need to Know About IP Surveillance by D-Link

June 2010 - (Free Research)
The video surveillance market is in the throes of transition. IP surveillance is rapidly taking over from traditional analog CCTV. Within the next three years more than half the surveillance cameras used in North America will be IP cameras, according to the research firm Frost & Sullivan. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console. 
(WHITE PAPER) READ ABSTRACT |

Data Security for Mobile Users: One Size Does Not Fit All by Accellion, Inc.

April 2014 - (Free Research)
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users. 
(WHITE PAPER) READ ABSTRACT |

Desktop Admin for BYOD: Security Chapter by SearchSecurity.com

February 2013 - (Free Research)
The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Secure Virtual Desktop Infrastructure by Citrix Systems, Inc. (E-mail this company)

October 2013 - (Free Research)
Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI. 
(WHITE PAPER) READ ABSTRACT |

Bringing Order to the Chaos of “Bring Your Own Device” by Enterasys

April 2012 - (Free Research)
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this. 
(WHITE PAPER) READ ABSTRACT |

Why Cloud-Based Security and Archiving Make Sense by Google Postini

June 2010 - (Free Research)
Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both. 
(WEBCAST) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by Information Security Magazine

April 2009 - (Free Research)
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology. 
(EZINE)

Best Practices to Increase the Agility of Your Finance Department by Workday

April 2012 - (Free Research)
Read this expert e-book to learn how new technologies and best practices are being used to help finance departments increase their agility and respond to ever-changing business environments. 
(EBOOK) READ ABSTRACT |

Business-Class Security and Compliance for On-Demand Instant Messaging by WebEx Communications, Inc.

December 2006 - (Free Research)
Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts