Security Mechanism In RequirementsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Mechanism In Requirements returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Authentication / Password Management
 •   Enterprise Data Protection and Privacy
 •   Access Control
 •   Endpoint Security
 •   Managed Security Services
 •   Virtualization

Related Searches
 •   Customer Security Mechanism In
 •   Manufacturer Security Mechanism
 •   Office Security Mechanism In
 •   Security Basic
 •   Security Contract
 •   Security Mechanism In Delaware
 •   Security Mechanism System
 •   Security Mechanism Templates
 •   Web Security Mechanism In
 •   Work Security Mechanism In
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

7 Types of Hard CISSP Exam Questions and How To Approach Them by Global Knowledge Network, Inc.

March 2006 - (Free Research)
Throughout the CISSP preparation course offered by Global Knowledge, we cover the various security mechanisms, principles, concepts, and facts that will be included on the CISSP exam. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

Embedded Security: Trusted Platform Module Technology Comes of Age by Utimaco Safeware

December 2005 - (Free Research)
This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability. 
(WHITE PAPER) READ ABSTRACT |

Meeting the challenges of virtualisation security by Trend Micro

August 2009 - (Free Research)
Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Stopping Crimeware In Its Tracks by FireEye

September 2008 - (Free Research)
This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks. 
(ANALYST REPORT) READ ABSTRACT |

BlackBerry Widget SDK Beta by BlackBerry

May 2010 - (Free Research)
The BlackBerry Widget Packager v1.0 is a tool that allows web developers to package their web assets into BlackBerry Widgets. 
(DOWNLOAD)

Jericho Forum: Data Protection by ComputerWeekly.com

January 2013 - (Free Research)
Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Managed File Transfer: The Need for a Strategic Approach by Inovis

September 2008 - (Free Research)
This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution. 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Executive Summary by GlobalScape

April 2008 - (Free Research)
The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements. 
(WHITE PAPER) READ ABSTRACT |

Authentication in the Enterprise: Current and Changing Requirements by PistolStar, Inc.

August 2009 - (Free Research)
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication. 
(WHITE PAPER) READ ABSTRACT |

IT Handbook: Cloud Computing Security Up Close by Intel

July 2011 - (Free Research)
This IT handbook is designed to help organizations make practical and strategic decisions about their own cloud security. Follow these guidelines to make sure that you've established policies that define data classification categories, data labeling mechanisms and data handling requirements. 
(WHITE PAPER) READ ABSTRACT |

Better Active Directory Auditing...Less Overhead, More Power by Netwrix Corporation

July 2010 - (Free Research)
Today’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make. 
(WHITE PAPER) READ ABSTRACT |

NAC: Bridging the Network Security Gap by Sophos, Inc.

February 2008 - (Free Research)
IT managers are aware of threats to their networks, and have spent heavily on solutions to protect the corporate environment. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security. 
(WHITE PAPER) READ ABSTRACT |

How to tackle trust and co-operation by ComputerWeekly.com

November 2010 - (Free Research)
It is well-known that eCommerce transactions require a level of trust between participants in that trust, in this context, gives each partner confidence that the other will fulfil his part of a bargain in the future. 
(WHITE PAPER) READ ABSTRACT |

IBM Worklight V5.0.6 by IBM

August 2012 - (Free Research)
This white paper presents a technology overview of IBM Worklight and further discusses the four main components: Development tools; Runtime server environment; Security and authentication mechanisms; System requirements. 
(WHITE PAPER) READ ABSTRACT |

How to tackle trust management by ComputerWeekly.com

November 2010 - (Free Research)
Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust. 
(WHITE PAPER) READ ABSTRACT |

Entrust IdentityGuard for Enterprise by Entrust, Inc.

January 2007 - (Free Research)
As an established global leader in layered security strategies, Entrust offers a cost-effective versatile authentication platform that can help organizations protect the identities of employees and partners accessing sensitive enterprise data. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Distributed Object Store Principles of Operation: The Case for Intelligent Storage by Hitachi Data Systems

February 2012 - (Free Research)
This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development. 
(WHITE PAPER) READ ABSTRACT |

How to use Collaboration Oriented Architectures by ComputerWeekly.com

November 2010 - (Free Research)
Collaboration Oriented Architectures (COA) describes information architectures that comply with the COA framework, which in turn is described in the associated COA Framework paper1. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Wireless LAN Security by Motorola, Inc.

May 2008 - (Free Research)
This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments. 
(WHITE PAPER) READ ABSTRACT |

The Systems Engineering Balancing Act: Choosing an Optimum Development Approach by IBM

March 2011 - (Free Research)
This thought leadership white paper proposes a combination of requirements-driven, model-driven and test-driven approaches as a mechanism for delivering systems development projects at a reduced cost and risk. 
(WHITE PAPER) READ ABSTRACT |

Safety Analysis Using UML by IBM

December 2010 - (Free Research)
This paper discusses the use of the fault tree analysis (FTA) approach to safety analysis and the use of the UML® profiling mechanism to create a safety analysis profile, including the definition of its normative metamodel. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Is SaaS the Future of Enterprise Security? by Webroot

June 2009 - (Free Research)
This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts