Security Monitoring Over DocumentsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Monitoring Over Documents returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Wireless Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Identity Management/ User Provisioning
 •   Access Control

Related Searches
 •   Development Security
 •   Environment Security Monitoring
 •   Procurement Security
 •   Script Security Monitoring
 •   Security Framework
 •   Security Monitoring Over Canadian
 •   Security Monitoring Over Directories
 •   Security Plans
 •   Sheet Security
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Book: Technical Guide on Network Security Monitoring by SearchMidMarketSecurity

May 17, 2010 - (Free Research)
SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit. 
(EBOOK) READ ABSTRACT |

Case Study: Deploying the Best SIEM System Available by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Uncover the SIEM a security service provider uses to help them achieve real-time visibility and control over their systems and services to increase intelligence, protection, and safety. 
(CASE STUDY) READ ABSTRACT |

Case Study: Novagalicia Secures Critical Applications with HP Fortify by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

KPN focuses on Information Security with HP by Hewlett-Packard Limited

November 25, 2013 - (Free Research)
View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting. 
(WEBCAST) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by Hewlett-Packard Limited

September 19, 2012 - (Free Research)
View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data. 
(WHITE PAPER) READ ABSTRACT |

Swisscomm Uses HP Security to Provide Superior and Secure Client Services by Hewlett-Packard Limited

August 02, 2013 - (Free Research)
Providing superior – and secure – services to clients is Swisscom's greatest goal. This quick video reveals how they have achieved the security needed, and who provides it. View now to learn more! 
(VIDEO) READ ABSTRACT |

IDC White Paper: Effective Information Security by CA (India) Technologies Pvt. Ltd

September 25, 2009 - (Free Research)
Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility... 
(ANALYST REPORT) READ ABSTRACT |

SANS Analyst Report: The Risks with Mobility and BYOD by Hewlett-Packard Limited

March 30, 2012 - (Free Research)
Businesses are migrating to a more mobile environment. Individuals use mobile apps and devices are used for both personal and business reasons. With today's workforce relying on mobility and apps, they can create a riskier environment for valuable information. 
(WHITE PAPER) READ ABSTRACT |

The Detrimental Cost of Cyber Crime by Hewlett-Packard Limited

October 25, 2013 - (Free Research)
In this analyst report by Ponemon Institute, see how cybercrime has continued to bring heavy economic damage to U.K. companies, and what they should do to reduce such detrimental impact. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: Banca Intesa Counters Threats with HP ArcSight by Hewlett-Packard Limited

March 29, 2013 - (Free Research)
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure. 
(CASE STUDY) READ ABSTRACT |

Security for a faster world - Issue 3 - 2013 by Hewlett-Packard Limited

October 21, 2013 - (Free Research)
Experts discuss the most pressing security trends and the methods needed to keep critical assets safe today. 
(WHITE PAPER) READ ABSTRACT |

Case Study: UAEU Sets the Standard for Network Security with HP by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Explore how the United Arab Emirates University was able to embrace mobile technology in the classroom while successfully mitigating both internal and external threats and increasing security visibility thanks to a next-generation intrusion protection system. 
(CASE STUDY) READ ABSTRACT |

2013 Cost of Cyber Crime – UK, France and Germany Findings by Hewlett-Packard Limited

October 31, 2013 - (Free Research)
Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks. 
(WEBCAST) READ ABSTRACT |

Policy-based Compliance Protects Enterprise Imaging and Printing Data by Hewlett-Packard Limited

October 18, 2013 - (Free Research)
This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP by Hewlett-Packard Limited

August 02, 2013 - (Free Research)
This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets. 
(VIDEO) READ ABSTRACT |

Oracle Mobile and Social Service: The Next Step in IAM by Oracle Corporation UK Ltd

November 30, 2012 - (Free Research)
As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe. 
(WHITE PAPER) READ ABSTRACT |

Protecting Sensitive Data and Resources Throughout the Organization by CA (India) Technologies Pvt. Ltd

March 01, 2009 - (Free Research)
CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Complete and Scalable Access Management by Oracle Corporation UK Ltd

April 25, 2013 - (Free Research)
This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs. 
(WHITE PAPER) READ ABSTRACT |

Achieve secure mobile access to enterprise applications by Oracle Corporation UK Ltd

April 25, 2013 - (Free Research)
This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper: Multicasting, TAP and Data Aggregation for Telecom by Gigamon

July 06, 2009 - (Free Research)
SoIP providers can no longer ignore the harsh business reality of providing a fixed-income service while accommodating ever-growing monitoring demands. Read this paper to learn how Data Access Network (DAN) has emerged as the "Best Practice" data access and network monitoring architecture for cost-effective DPI monitoring. 
(WHITE PAPER) READ ABSTRACT |

The Best PCI Audit of Your Life by Lumension

August 13, 2009 - (Free Research)
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life. 
(WHITE PAPER) READ ABSTRACT |

Monitoring network traffic: Appliance placement and choke points by Sourcefire

May 04, 2011 - (Free Research)
It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why. 
(EGUIDE) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 10, 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

ActivEcho Trial Download by Acronis

October 17, 2013 - (Free Research)
activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try. 
(PRODUCT DEMO) READ ABSTRACT |

Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI) by Gigamon

July 01, 2009 - (Free Research)
Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts