Security Indus Passport ItWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Indus Passport It returned the following results.
RSS What is RSS?
Related Categories

 •   Transportation Management

Related Searches
 •   Security Article
 •   Security Indus Passport Comparisons
 •   Security Indus Passport Resources
 •   Security Indus Screen
 •   Security Intranet
 •   Security Speed
 •   Small Security
 •   Suite Security Indus Passport
 •   Time Security Indus Passport
 •   Web Cast Security Indus
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Roaming Workforce With Cloud-Based Security by Sophos, Inc.

December 2013 - (Free Research)
This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter. 
(WHITE PAPER) READ ABSTRACT |

A UK Security Provider Fortifies its Systems for Greater Resiliency by IBM

December 2012 - (Free Research)
This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security. 
(CASE STUDY) READ ABSTRACT |

Channel Edge Reseller Program by Webroot

August 2013 - (Free Research)
This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

Authentication Management: Ensuring Security for Remote Workers by RSA, The Security Division of EMC

December 2013 - (Free Research)
This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations. 
(WHITE PAPER) READ ABSTRACT |

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It by Lumension

February 2013 - (Free Research)
This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now. 
(WEBCAST) READ ABSTRACT |

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT by Cisco (E-mail this company)

December 2013 - (Free Research)
This informative whitepaper explores the role of network security in an increasingly mobile workplace and what you can do to enhance employee productivity. 
(WHITE PAPER) READ ABSTRACT |

End Point Security in Medium and Large Organizations by Dell, Inc.

March 2014 - (Free Research)
This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss. 
(WHITE PAPER) READ ABSTRACT |

Buyer's Criteria for Next-Generation Network Security by Sourcefire

December 2013 - (Free Research)
This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies. 
(WHITE PAPER) READ ABSTRACT |

Information Security ANZ March 2014 by SearchSecurity.com

March 2014 - (Free Research)
This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region. 
(EZINE) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

Mobile Madness or BYOD Security? by Sophos, Inc.

November 2013 - (Free Research)
This informative paper examines the state of BYOD today and the direction in which it's going, discussing common challenges in implementing and managing it and helpful strategies for overcoming these obstacles. 
(WHITE PAPER) READ ABSTRACT |

Sophos EndUser Protection Overview by Sophos, Inc.

January 2013 - (Free Research)
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage. 
(VIDEO) READ ABSTRACT |

The Expanding Network Perimeter: How to Protect it With Unified Threat Management by Sophos, Inc.

August 2012 - (Free Research)
Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management. 
(WHITE PAPER) READ ABSTRACT |

Major Bank Solves Lost Laptop Problems Through Encryption by Dell, Inc.

May 2013 - (Free Research)
This white paper dives deep into a case study of a large bank that decided to get a jump on encrypting data long before it became a regulatory requirement. Inside, learn why they chose one vendor's solution to manage all endpoint protection products from a single cross-platform management console. 
(CASE STUDY) READ ABSTRACT |

BlackBerry 10: Setting New Standards in Mobile Security by BlackBerry

March 2014 - (Free Research)
This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs. 
(WHITE PAPER) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

DDOS Mitigation a Key Component in Network Security by Ixia

March 2014 - (Free Research)
This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan. 
(WHITE PAPER) READ ABSTRACT |

Safe and Sound: The Importance of PC Security and Manageability by Dell, Inc.

November 2013 - (Free Research)
This white paper discusses the biggest PC security and manageability pain points for IT pros. 
(WHITE PAPER) READ ABSTRACT |

Integrated IT Security for Midsize Businesses by IBM

October 2013 - (Free Research)
This guide explores security management strategies and how to combat the growth of sophisticated threats. 
(WHITE PAPER) READ ABSTRACT |

Security Intelligence is the Smart Way to Keep the Cloud Safe by IBM

October 2013 - (Free Research)
This guide explores a unique security intelligence platform and how it can secure your cloud. 
(WHITE PAPER) READ ABSTRACT |

A practical guide to keeping your virtual data centre safe by Sophos UK

June 2010 - (Free Research)
This whitepaper will focus on the best practices for the protection of virtual servers running in the data centre. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

February 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts