Security Monitoring Over CaliforniaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Monitoring Over California returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Policies
 •   Endpoint Security
 •   Wireless Security
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Intrusion Prevention Solutions

Related Searches
 •   Sales Security
 •   Security Advantages
 •   Security Monitoring Over Open
 •   Security Monitoring Over Planning
 •   Security Monitoring Over Webcasts
 •   Security Monitoring Rfp
 •   Security Network
 •   Security Reservation
 •   Security Software
 •   Webinars Security Monitoring Over
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities by HyTrust

July 01, 2011 - (Free Research)
With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.

March 09, 2010 - (Free Research)
Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution. 
(WHITE PAPER) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

Data Breaches: A Growing Problem for the Healthcare Community by Wave Systems Corp.

March 2011 - (Free Research)
While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss. 
(WHITE PAPER) READ ABSTRACT |

Lending Tools Streamlines Over 1,100 File Transfer Tasks with MOVEit by Ipswitch File Transfer

June 2013 - (Free Research)
This case study details the solution LendingTools.com put in place that provided the file management and automation they need to manage, automate, secure, and monitor large volumes of data for their customers. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Oracle Scorecard and Strategy Management by Oracle Corporation

October 2010 - (Free Research)
This data sheet details how Oracle Scorecard and Strategy Management extends the Oracle Business Intelligence Enterprise Edition (OBIEE) with capabilities that enable strategic goals to be communicated across the organization and monitoring progress over time. Read on to learn about the features and benefits of this innovative solution. 
(DATA SHEET) READ ABSTRACT |

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security? by CA Technologies.

May 2012 - (Free Research)
Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments. 
(WHITE PAPER) READ ABSTRACT |

ActivEcho Trial Download by Acronis

October 2013 - (Free Research)
activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try. 
(PRODUCT DEMO) READ ABSTRACT |

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests by McAfee, Inc.

March 2009 - (Free Research)
In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab. 
(TEST RESULTS) READ ABSTRACT |

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses by Cisco Systems, Inc.

February 2009 - (Free Research)
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software. 
(CASE STUDY) READ ABSTRACT |

Overcoming Network Degradation Blues with OpManager NCM Plug-in by ManageEngine

July 2010 - (Free Research)
This paper discusses the network configuration management challenges, the need for the NCM plug-in and its benefits. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Every Man's Guide to Combat Threats Within Your Organization by ISC2

June 2009 - (Free Research)
This eGuide highlights how mobile computing is more than just a trend, what cybersecurity experts have to say about information warfare, and what you can do to enhance team intelligence. 
(EGUIDE) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

April 2013 - (Free Research)
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Automating User Provisioning: A User’s Perspective by Oracle Corporation

April 2011 - (Free Research)
Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs. 
(WEBCAST) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

No Blind Spots in Perimeter Security with Security Event Information Management by Radware

October 2011 - (Free Research)
Security Event Information Management (SEIM) can provide the security leap-frog in a world of point solutions – to ensure there are no blind spots in your network security architecture. 
(WHITE PAPER) READ ABSTRACT |

Delivering applications anywhere, anytime with maximum security and control over data by Citrix

November 2010 - (Free Research)
Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp 
(WHITE PAPER) READ ABSTRACT |

Avocent Accelerates Critical Applications over WAN While Ensuring Distributed Web Security at Branch Offices by BlueCoat

September 2011 - (Free Research)
IT infrastructure management solutions provider, Avocent Corporation, needed to accomplish two critical tasks: Improve performance of key business applications and provide decentralized Web security and control for their branch offices. View this case study to learn how they were able to meet both needs with just one solution. 
(CASE STUDY) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Inside IT: Stopping Security Threats in an Ever-Changing Landscape by Intel

December 2012 - (Free Research)
In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure. 
(PODCAST) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts