Security ImprovementsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Improvements returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Managed Security Services
 •   Wireless Security
 •   Authentication / Password Management
 •   Application Security
 •   Service Oriented Architecture (SOA)

Related Searches
 •   Measures Security Improvements
 •   Multi Security
 •   Price Security
 •   Product Security Improvements
 •   Security Improvements Computerized
 •   Security Improvements Control
 •   Security Improvements Kentucky
 •   Security Improvements Migration
 •   Security Improvements Productivity
 •   Server Security Improvements
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Windows 7 Security: A Great Leap Forward or Business as Usual? by Sophos, Inc.

October 13, 2009 - (Free Research)
Debates and discussions about the new Windows 7 have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Top Reasons to Deploy Virtual Desktops Now by Dell, Inc.

April 06, 2011 - (Free Research)
This e-guide from SearchVirtualDesktop.com details the top four reasons to deploy virtual desktops, including lower desktop support costs and application security improvements. Plus, gain expert insight from Brian Madden to learn how to sell desktop virtualization to traditional desktop admins. 
(EGUIDE) READ ABSTRACT |

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate by Thawte Inc.

July 03, 2012 - (Free Research)
This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Web Browser Security Features Make Attacks Harder by GeoTrust, Inc.

July 17, 2013 - (Free Research)
This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder. 
(EGUIDE) READ ABSTRACT |

Planning for the Security Features of Windows 7 Professional by Dell, Inc. and Microsoft Windows 7

October 21, 2009 - (Free Research)
With Windows 7 Professional, Microsoft has added and extended many security capabilities in its flagship Windows operating system (OS). Deciding which features to activate as well as testing will impact the planning for every Windows 7 rollout. This analyst report will analyze the major security capabilities of Windows 7 in order of importance. 
(ANALYST REPORT) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 03, 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements by Dell and Microsoft

November 19, 2010 - (Free Research)
This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements by Dell and Microsoft

May 21, 2010 - (Free Research)
This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

HP Business Service Management by Hewlett-Packard Company

February 04, 2011 - (Free Research)
HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business. 
(WEBCAST) READ ABSTRACT |

The Role of Password Management in Achieving Compliance by PistolStar, Inc.

June 2008 - (Free Research)
This paper will look at the dramatic impact password management solutions have had on organizations. 
(WHITE PAPER) READ ABSTRACT |

The Improvement and Evolution of SIEM by Hewlett-Packard Company

April 2013 - (Free Research)
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com. 
(EGUIDE) READ ABSTRACT |

Five Fundamental Data Quality Practices by Pitney Bowes Group 1 Software

September 2011 - (Free Research)
This white paper is a list of five data quality practices and how they can be implemented into an organization's daily data quality processes. 
(WHITE PAPER) READ ABSTRACT |

Practical Business Process Improvement by Progress Software, Inc.

March 2011 - (Free Research)
The promise of BPM is to make business more efficient and deliver that ever elusive continuous improvement. This is a challenge for all businesses. The key question remains, “How can I know what needs to be improved?” This paper will shed light on how to continuously improve business processes in order to stay competitive. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization: Overcoming Five Real-World Challenges by Citrix

January 2009 - (Free Research)
This paper explores the most significant hurdles any desktop virtualization program needs to overcome. Staying focused on the ultimate goal--delivering core applications effectively to users--helps clarify the issues involved in desktop virtualization deployment. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Network Performance Improvement - What You Need to Know by Dell and VMware

April 2012 - (Free Research)
In this presentation transcript, get help setting goals for your network before jumping into server virtualization, and discover how these goals can be applied to any sized business. Gain insight on connecting your network to a disaster recovery network, and considerations to make when migrating to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals by Lumension

January 2012 - (Free Research)
Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Kick-Starting Your Data Quality Program by SearchDataManagement

July 2013 - (Free Research)
This handbook offers tips and strategies for balancing manual and automated data quality processes, building a business case for purchasing data quality tools and creating an effective data quality program. 
(WHITE PAPER) READ ABSTRACT |

Enterprises Have Room for Improvement in Secure IT Asset Disposition by Iron Mountain

December 2013 - (Free Research)
Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations. 
(WHITE PAPER) READ ABSTRACT |

The Seattle Times Meets with Imprivata OneSign™ Deadlines and Security Needs by Imprivata

January 2008 - (Free Research)
With OneSign up and running, The Seattle Times saw an immediate improvement in its security policy enforcement. 
(CASE STUDY) READ ABSTRACT |

SearchDataBackup VMware Backup Tutorial by Quantum Corporation

August 2009 - (Free Research)
Virtual server backup is a known pain point among backup administrators. In our tutorial, learn all about VMware backup with this collection of articles on VMware backup and restore, VMware Consolidated Backup, Virtual Desktop Infrastructure and more. 
(EGUIDE) READ ABSTRACT |

Cloud Computing Drives Breakthrough Improvements in IT Service Delivery, Speed, and Costs by IBM

December 2010 - (Free Research)
This white paper discusses the business drivers motivating IT buyers to consider cloud computing as an alternative to traditional dedicated IT architectures and in-house sourcing models. It describes how IBM is investing to support public, private, and hybrid cloud solutions. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Metalogix Content Migration and Upgrade for Microsoft SharePoint Server 2010 by Metalogix

April 2010 - (Free Research)
This paper discusses both Microsoft's out-of-box migration approaches and Metalogix's SharePoint Site Migration Manager 2010. It describes common migration scenarios, and how those scenarios can be addressed using the different migration approaches. 
(WHITE PAPER) READ ABSTRACT |

Automation, continuous integration and continuous improvement in Agile ALM -- Part 2 by IBM

November 2011 - (Free Research)
This second part of a two-part expert Q & A digs more deeply into automation skills, build automation, continuous integration, and continuous improvement to processes within application lifecycle management (ALM). 
(EGUIDE) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts