Security Management ProfessionalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Management Professional returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Managed Security Services
 •   Anti-Virus Solutions
 •   Wireless Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Computer Security Management
 •   Controls Security Management
 •   Customers Security Management
 •   Operational Security Management
 •   Security Improvements
 •   Security Management Professional Source
 •   Security Management Professional Vendors
 •   Security Management Report
 •   Security Procedure
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Holistic risk management: Perspectives for IT professionals by IBM

October 16, 2012 - (Free Research)
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives. 
(WHITE PAPER) READ ABSTRACT |

McAfee 15 Minutes to a Secure Business: Daily Security Practices by McAfee, Inc.

November 23, 2009 - (Free Research)
This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Provide Better Visibility and Manageability across Network Security Tools by WatchGuard Technologies, Inc.

September 30, 2013 - (Free Research)
Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment. 
(ANALYST REPORT) READ ABSTRACT |

Understanding Big Data and Security by Hewlett-Packard Limited

April 16, 2013 - (Free Research)
This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility. 
(WEBCAST) READ ABSTRACT |

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals by Lumension

January 23, 2012 - (Free Research)
Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security. 
(WHITE PAPER) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Limited

January 31, 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Company

January 14, 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Hidden Lynx – Professional Hackers for Hire by Symantec Corporation

February 17, 2014 - (Free Research)
This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system. 
(WEBCAST) READ ABSTRACT |

Information Security Magazine - February 2013 by SearchSecurity.com

February 01, 2013 - (Free Research)
In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more. 
(EZINE) READ ABSTRACT |

Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud by Webroot

October 18, 2013 - (Free Research)
In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy. 
(EGUIDE) READ ABSTRACT |

The hidden costs of self-signed SSL certificates by Symantec Corporation

December 31, 2012 - (Free Research)
This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor. 
(WHITE PAPER) READ ABSTRACT |

Moving Compliance Forward by Tenable Network Security (E-mail this company)

October 08, 2013 - (Free Research)
Read this expert e-guide and discover how analysts see big changes ahead around risk management. Managing partner at VerSprite, Tony Uceda Velez also explains how leveraging a threat model can re-energize your compliance strategy. 
(EGUIDE) READ ABSTRACT |

E-Guide A Decision Maker’s Guide to Log Management by ArcSight, an HP Company

October 27, 2010 - (Free Research)
While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs. 
(EGUIDE) READ ABSTRACT |

The RSA GRC Reference Architecture by RSA, The Security Division of EMC

June 30, 2013 - (Free Research)
With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business. 
(WHITE PAPER) READ ABSTRACT |

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals by Imprivata

December 31, 2013 - (Free Research)
This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions. 
(WHITE PAPER) READ ABSTRACT |

Two Great Ways to Protect Your Virtual Machines From Malware by Sophos, Inc.

April 03, 2014 - (Free Research)
This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments. 
(WHITE PAPER) READ ABSTRACT |

2012 Bit9 Cyber Security Research Report by Bit9, Inc.

May 23, 2012 - (Free Research)
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers. 
(WHITE PAPER) READ ABSTRACT |

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 03, 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls by Sophos, Inc.

November 30, 2013 - (Free Research)
Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system. 
(WHITE PAPER) READ ABSTRACT |

IBM Security Services Client Reference Guide by IBM

November 30, 2013 - (Free Research)
This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges. 
(WHITE PAPER) READ ABSTRACT |

SIEM Technical Guide by SearchSecurity.com

February 19, 2014 - (Free Research)
This TechGuide examines the policies and enhanced monitoring needed from a SIEM to make smarter decisions and respond faster to incidents. 
(EGUIDE) READ ABSTRACT |

Expert Advice – 20 Practical Tips on Authentication from Healthcare IT Professionals by Imprivata

December 31, 2013 - (Free Research)
This resource reveals 20 single sign-on (SSO) and strong authentication implementation tips from your successful peers. 
(WHITE PAPER) READ ABSTRACT |

Accelerating Incident Response and Reducing Security Risks by Dell SecureWorks UK

April 01, 2014 - (Free Research)
This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan. 
(WHITE PAPER) READ ABSTRACT |

Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks by Dell SecureWorks UK

February 28, 2011 - (Free Research)
This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts