Security Policy Need PresentationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Policy Need Presentation returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Security Monitoring
 •   Application Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Managed Security Services
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Endpoint Security
 •   Identity Management/ User Provisioning

Related Searches
 •   Buy Security
 •   Creating Security Policy Need
 •   Document Security Policy
 •   Knowledge Security Policy
 •   Profile Security
 •   Security Audit
 •   Security Policy B2B
 •   Security Policy Need Related
 •   Security Policy Need Uk
 •   Security Statements
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Is Your Network Ready for Cloud Computing - Presentation Transcript by Cisco Systems, Inc.

February 08, 2012 - (Free Research)
This presentation transcript will look at areas to cover with the cloud provider, including possible adjustments to firewalls and other perimeter defenses such as IPS, and how to ensure the changes don’t violate security policy. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Setting up Security Policies and Procedures for the Cloud by Webroot

August 19, 2011 - (Free Research)
This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Transcript: Covering the basics in MDM? Why it’s time to advance your strategy by BlackBerry

November 07, 2012 - (Free Research)
Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more! 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by IronKey

May 26, 2009 - (Free Research)
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 29, 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Revelations and Realities of Endpoint Security by GFI Software

July 29, 2011 - (Free Research)
Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Are your applications cloud-ready? by IBM

November 28, 2011 - (Free Research)
This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 01, 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 16, 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Business Case for Data Protection Survey & Results by Ounce Labs, an IBM Company

October 21, 2009 - (Free Research)
This presentation transcript presents the results of a survey conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company. The survey determines what senior executives think about the value proposition of corporate data protection efforts. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Introducing BlackBerry Balance™ Technology by BlackBerry

September 16, 2011 - (Free Research)
Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 19, 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 31, 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Helping to Reduce Compliance Costs for the UK Public Sector by Dell SecureWorks UK

August 22, 2011 - (Free Research)
Dell SecureWorks has vast experience in helping customers achieve successful audits against compliance standards. In this presentation trancript, Lee Lawson, Head of Security Testing and Response services with Dell SecureWorks, offers advice on how to maximize your budget. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council by Dell SecureWorks UK

August 22, 2011 - (Free Research)
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Location Evaluation Factors for Offshore Outsourcing: The Promise and the Peril by Accenture

March 17, 2009 - (Free Research)
When it comes to offshore outsourcing, security and location decisions have become more important overtime. Read this presentation transcript from the webcast of the same name and discover best practices and security risks in offshore outsourcing. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control by Intel

May 20, 2011 - (Free Research)
User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk.  Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Changing Authentication Options by ActivIdentity Corporation

March 21, 2011 - (Free Research)
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Risk Mitigation – Bang for the Buck by ActivIdentity Corporation

March 21, 2011 - (Free Research)
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Practices for VMware by Vyatta Inc.

July 10, 2012 - (Free Research)
To properly protect your virtual environment, you must address security at the hypervisor, VM, and network level. This presentation transcript details the fundamentals of virtualization security and highlights the importance of establishing effective management policies. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance by Intel

May 19, 2011 - (Free Research)
In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security the future: Keeping up with the business by ComputerWeekly.com

March 01, 2013 - (Free Research)
Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

Defining and Enforcing a Clear Mobile Device Security Policy by BlackBerry

February 18, 2013 - (Free Research)
If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more. 
(EGUIDE) READ ABSTRACT |

Understanding What your Endpoint Security Policy Needs by Symantec Corporation

November 22, 2013 - (Free Research)
Access this e-guide for tips to determine whether antivirus alternatives should be brought to your network. Uncover what the future of endpoint antimalware holds, as well as how to detect hostile endpoints. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Securing Access to Resources in the Cloud:  What's Really Possible Today by FoxT

May 19, 2010 - (Free Research)
This presentation transcript explores the cloud from both a business and technical perspective to show how organizations can benefit from cloud services while maintaining the control and auditing capabilities to remain secure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts