Security Policies CustomersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Policies Customers returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Endpoint Security
 •   Vulnerability Assessment
 •   Managed Security Services

Related Searches
 •   B2B Security Policies Customers
 •   Info About Security
 •   Provider Security Policies
 •   Providers Security
 •   Reservation Security
 •   Security Policies Benefit
 •   Security Policies Compliance
 •   Security Policies Customers Video
 •   Security Policies Monitor
 •   Security Study
Advertisement

ALL RESULTS
1 - 25 of 391 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Lumension® Device Control for Microsoft® System Center by Lumension

January 2010 - (Free Research)
Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement. 
(DATA SHEET)

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Security Policies for Next-Generation IT by Hexis Cyber Solutions Inc

October 2012 - (Free Research)
This CIO Decisions e-zine focuses on effective BYOD security policy. Inside, learn why security threats are evolving faster than the management practices that defend against them and, more importantly, how you can stay ahead. 
(EBOOK) READ ABSTRACT |

Avoiding 7 Common Mistakes of IT Security Compliance by Qualys, Inc.

April 2009 - (Free Research)
This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals. 
(EGUIDE) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

CIO insights: Moving from the back office to the front line by ComputerWeekly.com

December 2013 - (Free Research)
This major global C-level survey from IBM examines the changing role of the CIO and makes recommendations for CIOs who want to move from the back office to the front line of the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Developing an Effective Corporate Mobile Policy by BlackBerry

June 2008 - (Free Research)
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing. 
(WHITE PAPER) READ ABSTRACT |

How retailers can manage customer data collection to decrease fraud by SonicWALL

March 2011 - (Free Research)
This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities. 
(EGUIDE) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Data Protection Solution-Taking Control of Your Data by Lumension

October 2008 - (Free Research)
Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control. 
(WHITE PAPER) READ ABSTRACT |

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion by Accellion, Inc.

April 2014 - (Free Research)
Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls. 
(WHITE PAPER) READ ABSTRACT |

As data grows, so do the risks: How to improve data and app sec by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms – Cloud Gateway Security with Intel® SOA Expressway by Intel

February 2011 - (Free Research)
The Intel Cloud Builders program provides a starting point by supplying a basic hardware blueprint and available cloud software management solutions, such as Intel® SOA Expressway. The use cases described in this reference architecture can be used as a baseline to build more complex usage and deployment models to suit specific customer needs. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 501 Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Regulations Shift Focus on Outbound Email Security by Proofpoint, Inc.

July 2008 - (Free Research)
Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation

August 2010 - (Free Research)
This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2013 - (Free Research)
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met. 
(WHITE PAPER) READ ABSTRACT |

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

Accenture Technology Vision 2014 by ComputerWeekly.com

January 2014 - (Free Research)
The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Big Data and Content Analytics: measuring the ROI by ComputerWeekly.com

December 2013 - (Free Research)
Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Integrating security with HP TippingPoint by HP & Intel®

November 2012 - (Free Research)
Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance. 
(WHITE PAPER) READ ABSTRACT |

Access Accounts More Securely with Intel® Identity Protection Technology by Intel

August 2011 - (Free Research)
This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Winning the PCI Compliance Battle by Qualys

October 2011 - (Free Research)
This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

1 - 25 of 391 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts