Security DesignsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Designs returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Security Monitoring
 •   Data Security
 •   Endpoint Security
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Technology ROI Tools
 •   Enterprise Systems Management
 •   Authentication / Password Management

Related Searches
 •   Basics Of Security Designs
 •   Ecommerce Security
 •   Office Security Designs
 •   Security Designs California
 •   Security Designs Implementation
 •   Security Designs Professional
 •   Security Designs Systems
 •   Security Designs Testing
 •   Security Devices
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Transforming Information Security: Designing State-of-the-Art Extended Team by RSA, The Security Division of EMC

December 31, 2013 - (Free Research)
This informative whitepaper explores strategies for designing a state-of-the-art security team. 
(WHITE PAPER) READ ABSTRACT |

Cloud Security Designed for Amazon Web Services (AWS) by Trend Micro

May 19, 2014 - (Free Research)
This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Creating a Network Endpoint Security Policy for Hostile Endpoints by SearchSecurity.com

February 2013 - (Free Research)
Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully. 
(EGUIDE) READ ABSTRACT |

Maximize Your Return on Investment for Virtualization and Cloud Computing by Trend Micro, Inc.

October 2011 - (Free Research)
View this paper to discover how platform-aware security can provide integrated security designed for virtual servers, VDI and the cloud, without sacrificing performance or management, ultimately maximizing your return on investment (ROI). 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Enforcing Endpoint Security: Creating a Network Security Policy by SearchSecurity.com

June 2012 - (Free Research)
As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them. 
(EGUIDE) READ ABSTRACT |

How to Make Virtual Desktop Security Simpler and More Scalable by Citrix

April 2011 - (Free Research)
It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users. 
(WEBCAST) READ ABSTRACT |

Zero Trust Model: Securing the Extended Enterprise by Sophos, Inc.

February 2012 - (Free Research)
The emergence of new connection options and devices being introduced to the enterprise are extending networks well beyond their controllable boarders. This expert resource offers insight into securing the extended enterprise, exploring the strategy behind Zero Trust Model, creating network security policies for hostile endpoints and more. 
(EGUIDE) READ ABSTRACT |

Server Security Survey Report by Bit9, Inc.

November 2013 - (Free Research)
In October 2013, Bit9 conducted a survey on server security designed to analyze challenges in the inability to detect or stop advanced attacks – click now to discover key findings and takeaways. 
(WHITE PAPER) READ ABSTRACT |

Proofpoint Messaging Security Gateway Virtual Edition by Proofpoint, Inc.

November 2006 - (Free Research)
VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Achieve Security Success in the Creative Cloud by CDW Corporation

February 2014 - (Free Research)
Product, website and application design teams can now use Adobe Creative Cloud services to reduce licensing costs and access secure versions of Adobe's applications on a subscription basis in the cloud. This resource outlines Adobe's strict security measures around Creative Cloud as well and touches on the storage options and collaboration tools. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware* by Intel

April 2011 - (Free Research)
This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhancing Server Platform Security with VMware by Intel

April 2011 - (Free Research)
Intel® Cloud Builders built a cloud with the use of a technology preview version of VMware vCenter Server, VMware vSphere Hypervisor, Intel Xeon processor 5600 series based server platforms and a plug in designed to interface with Intel Trusted Execution technology to provide platform attestration in the cloud. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

Seven Design Requirements for Web 2.0 Threat Protection by McAfee, Inc.

April 2009 - (Free Research)
Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements. 
(WHITE PAPER) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

HyTrust, VMware, Intel® Cloud Builders Enhanced Cloud Security Guide by Intel

August 2011 - (Free Research)
This white paper describes the current threat landscape and recommends a reference architecture designed to minimise the risks of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Presentation Transcript: Discover: New Backup Strategies Designed to StoreOnce by Hewlett-Packard Limited

January 2011 - (Free Research)
This presentation transcript from  how to manage the data with different data reduction technologies.  It also outlines examples of how to improve disaster recovery plans using centralised remote replication and how you can design a business continuity strategy that is not only highly efficient, but also future proof using HP StoreOnce. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts