Security Management PurchaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Management Purchase returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Managed Security Services
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Wireless Security
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Designers Security Management Purchase
 •   Format Security Management Purchase
 •   Net Based Security Management Purchase
 •   Public Security Management Purchase
 •   Security Contacts
 •   Security Data
 •   Security Management Purchase Functions
 •   Security Management Purchase White Paper
 •   Security Server
Advertisement

ALL RESULTS
1 - 25 of 431 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

About to Buy: Mobile Device Management Software by SearchSecurity.com

August 10, 2012 - (Free Research)
Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase. 
(EBOOK) READ ABSTRACT |

About to Buy Guide: Mobile Device Management Software by SearchSecurity.com

March 30, 2012 - (Free Research)
Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision. 
(EBOOK) READ ABSTRACT |

E-Guide: Shortcut guide to Web application firewall deployment by SearchSecurity.com

September 22, 2011 - (Free Research)
Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment. 
(EGUIDE) READ ABSTRACT |

IT Decision Checklist: Antimalware by ESET

October 27, 2011 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today. 
(EGUIDE) READ ABSTRACT |

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 22, 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

Emerging PaaS security tactics by SearchSecurity.com

May 02, 2012 - (Free Research)
Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk. 
(EGUIDE) READ ABSTRACT |

SIEM IT Decision Center- Checklist #1 by SearchSecurity.com

January 01, 2013 - (Free Research)
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms. 
(EGUIDE) READ ABSTRACT |

Holistic risk management: Perspectives for IT professionals by IBM

October 16, 2012 - (Free Research)
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Building a Solid Foundation for Security and Risk Management-- A Practical Approach to Achieve Security High Performance by IBM

July 23, 2010 - (Free Research)
Read this presentation transcript to learn about recent market research results from Enterprise Management Associates (EMA) regarding the greatest security challenges facing today’s businesses and what you must consider when building a solid IT security management foundation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Technical Guide on Network Security Monitoring by SearchMidMarketSecurity

May 17, 2010 - (Free Research)
SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit. 
(EBOOK) READ ABSTRACT |

Five Keys to Disk Backup Scalability by ExaGrid Systems, Inc.

April 19, 2011 - (Free Research)
In selecting a disk-based backup solution, it’s critical to consider the scalability of each prospective solution to ensure that it will meet the needs of your organization now and into the future. This paper outlines the five key questions you should ask when evaluating the scalability of any disk-based backup solution. 
(WHITE PAPER) READ ABSTRACT |

Expert Guide to Secure Web Gateways by TechTarget

March 18, 2014 - (Free Research)
Investments in secure Web gateways (SWG) are on the rise because traditional firewalls don't stop all attacks against enterprise systems. Don't waste another minute researching SWG feature options. Participate in our brief survey and waiting for you is your complimentary e-guide that outlines why SWG is worth the investment. 
(RESOURCE)

Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud by SearchSecurity.com

October 18, 2013 - (Free Research)
In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy. 
(EGUIDE) READ ABSTRACT |

NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800 by IBM

December 31, 2013 - (Free Research)
This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution. 
(WHITE PAPER) READ ABSTRACT |

Using SLAs to Gain a Competitive Advantage by BlueCoat

December 28, 2008 - (Free Research)
This whitepaper will discuss these managed service trends and challenges, and will identify the steps to success to meet customers. Escalating application and security requirements. 
(ANALYST REPORT) READ ABSTRACT |

Buyer’s Guide for Access Management by Oracle Corporation

April 26, 2011 - (Free Research)
Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution. 
(WHITE PAPER) READ ABSTRACT |

Gamania Group tightens security to strengthen game development capability by Hewlett-Packard Company

October 31, 2012 - (Free Research)
Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: IT Security and Defence Strategies by Kaseya International Limited

August 30, 2011 - (Free Research)
With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy. 
(EGUIDE) READ ABSTRACT |

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website by GeoTrust, Inc.

December 31, 2011 - (Free Research)
This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more. 
(WHITE PAPER) READ ABSTRACT |

Collaboration gives GE more dynamic, secure mobile workforce by Hewlett-Packard Limited

February 12, 2014 - (Free Research)
Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more. 
(VIDEO) READ ABSTRACT |

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 13, 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

September Information Security Magazine by SearchSecurity.com

August 30, 2013 - (Free Research)
Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come. 
(EZINE) READ ABSTRACT |

Information Security Magazine - February 2013 by SearchSecurity.com

February 01, 2013 - (Free Research)
In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more. 
(EZINE) READ ABSTRACT |

Why Enterprises Are Really Deploying NGFWs by Fortinet, Inc.

March 19, 2014 - (Free Research)
This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase. 
(WEBCAST) READ ABSTRACT |

E-Book: Technical Guide on Network Security Monitoring by AVG Technologies USA, Inc.

November 22, 2010 - (Free Research)
Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com. 
(EBOOK)

1 - 25 of 431 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts