Security Policy MetricsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Policy Metrics returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Security Monitoring
 •   Mobile Device Management
 •   Wireless Security
 •   Application Security
 •   Wireless Technologies and Mobile Computing
 •   Access Control

Related Searches
 •   Mac Security Policy
 •   New Security Policy
 •   Owning Security
 •   Pricing Security Policy Metrics
 •   Procurement Security
 •   Security Policy Metrics Content
 •   Security Policy Processing
 •   Security Virginia
 •   Wireless Security Policy
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Threat Analysis: Understanding and Combating DDoS Attacks by SecureWorks

May 2011 - (Free Research)
This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations. 
(WHITE PAPER) READ ABSTRACT |

PassMark Report: Enterprise Endpoint Security Performance Benchmarks by Symantec Corporation

November 2012 - (Free Research)
This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products by Webroot

July 2012 - (Free Research)
PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource. 
(WHITE PAPER) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by CA Technologies.

July 2010 - (Free Research)
Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies. 
(ANALYST REPORT) READ ABSTRACT |

Data Security for Mobile Users: One Size Does Not Fit All by Accellion, Inc.

April 2014 - (Free Research)
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users. 
(WHITE PAPER) READ ABSTRACT |

7 Requirements of Data Loss Prevention by Symantec Corporation

March 2009 - (Free Research)
This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution. 
(WHITE PAPER) READ ABSTRACT |

Discover information integration and governance in your organization by IBM

May 2011 - (Free Research)
In this presentation transcript, Ron Powell will provide an overview of the information integration and governance theme and discuss the importance of the five topics within that theme: information integration, MDM, data warehousing and analytics, database management and tools, and database security and privacy, and lifecycle management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

Improve BYOD with the Bonjour Protocol by Aerohive Networks

November 2012 - (Free Research)
This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy. 
(EGUIDE) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

Five Best Practices for Protecting Backup Data by Iron Mountain.

June 2010 - (Free Research)
Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Writing a HIPAA-friendly BYOD Policy by HP & Intel®

March 2013 - (Free Research)
This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital. 
(EGUIDE) READ ABSTRACT |

Tips for Creating a HIPAA-Friendly BYOD Policy by HP & Intel®

December 2012 - (Free Research)
This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital. 
(EGUIDE) READ ABSTRACT |

Solution Note: Enabling the Secure Use of Facebook by Palo Alto Networks

April 2012 - (Free Research)
With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner. 
(WHITE PAPER) READ ABSTRACT |

The Health Care Cloud: Increasing the Need for Disaster Recovery by HP & Intel®

March 2013 - (Free Research)
This e-guide explores how, as EHR vendors venture into the cloud, the need for improved disaster recovery and security policies is becoming more apparent. 
(EGUIDE) READ ABSTRACT |

Alegent Health Implements Courion Solutions to Deliver Access Assurance by Courion Corporation

December 2009 - (Free Research)
This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained. 
(CASE STUDY) READ ABSTRACT |

Policy-based Compliance Protects Enterprise Imaging and Printing Data by Hewlett-Packard Limited

October 2013 - (Free Research)
This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Use BYOD Policies to Integrate Personal Devices Securely by HP & Intel®

May 2013 - (Free Research)
This e-guide from SearchHealthIT.com highlights the importance of implementing effective BYOD policies to ensure the security of your health care data. Moreover, learn how to embrace BYOD without compromising compliance. 
(EGUIDE) READ ABSTRACT |

HP Bring your own device to Healthcare by HP & Intel®

June 2012 - (Free Research)
This white paper offers valuable insight for health care providers looking to harness the potential of BYOD initiatives by allowing caregivers and administrators to use their own mobile devices in a way that is secure and operationally efficient. 
(WHITE PAPER) READ ABSTRACT |

Password Management Best Practices by Hitachi ID Systems, Inc.

June 2010 - (Free Research)
This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords. 
(WHITE PAPER) READ ABSTRACT |

Integrating security with HP TippingPoint by HP & Intel®

November 2012 - (Free Research)
Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts