Security Programmability ProjectsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Programmability Projects returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Project Management Solutions
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Storage Security
 •   Virtualization
 •   Application Security
 •   Network Security
 •   Wireless Security
 •   Access Control

Related Searches
 •   Capacities Security
 •   Impact Security
 •   Related Security
 •   Risk Security Programmability
 •   Security Analyst
 •   Security Spreadsheets
 •   Server Security Programmability
 •   Supply Security Programmability Projects
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine – April 2014 by SearchSecurity.com

April 01, 2014 - (Free Research)
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks. 
(EZINE) READ ABSTRACT |

Network Programmability Is Real: Five Use Cases for Our Disaster Recovery Cloud Services by Cisco Systems, Inc.

February 17, 2014 - (Free Research)
This resource covers the benefits found from five use cases for a networking platform that will provide added flexibility and agility. 
(WHITE PAPER)

The Cisco ONE Enterprise Networks Architecture Enables Business Transformation by Cisco (E-mail this company)

November 30, 2013 - (Free Research)
This brief white paper focuses on the 3 forces that are driving the need for the evolution of the overall enterprise network and presents a solution that transforms the network to provide unmatched levels of openness and programmability. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Local Traffic Manager Datasheet by F5 Networks

November 22, 2013 - (Free Research)
This exclusive paper examines a traffic manager tool that can help you deliver your applications to users in a reliable and secure fashion, providing the extensibility and flexibility of an intelligent services framework and the programmability you need to manage a diverse infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Cisco® ONE: Framework for the Internet of Everything by Cisco Systems, Inc.

March 29, 2013 - (Free Research)
Uncover how leveraging Cisco ONE can help service providers enjoy the benefits of tomorrow's network and software innovations, harness network value, increase business agility, and achieve greater operational efficiency than ever before. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution – March 2014 by SearchNetworking.com

February 28, 2014 - (Free Research)
In this issue of Network Evolution, cloud and managed VPN providers offer alternatives to managing VPNs in-house. We also explore OpenStack Neutron and changing roles of networking pros. 
(EZINE) READ ABSTRACT |

The Programmable Network by F5 Networks

November 15, 2013 - (Free Research)
This exclusive resource examines how you can utilize a software-defined network (SDN) to dramatically increase agility, allowing your data center to respond to rapidly changing business needs. 
(WHITE PAPER) READ ABSTRACT |

Accelerating network convergence in virtualized and cloud data centers by Dell, Inc.

November 11, 2013 - (Free Research)
In this white paper, you will discover an innovative unified storage switch that provides a comprehensive platform and modular design that supports leading edge networking protocols – enabling IT organizations to converge LAN and SAN throughput in high I/O, virtualized environments. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme? by ComputerWeekly.com

April 01, 2014 - (Free Research)
In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now. 
(EZINE) READ ABSTRACT |

Identify And Influence Identity Stakeholders by Ping Identity Corporation

July 16, 2012 - (Free Research)
This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Advanced Project Version Management in Schlumberger Petrel Platform Environments with Hitachi Storage Adapter for Petrel by Hitachi Data Systems

August 31, 2013 - (Free Research)
This resource profiles a storage adapter for advanced project management that can help you optimize exploration and development operations, reduce storage management complexity and TCO, and more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 17 January 2012: featuring the future of IT education; G-Cloud in action; networking challenges by ComputerWeekly.com

January 17, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the future of computer science education now the government has scrapped the current ICT curriculum, and what this means for the IT industry. We talk to an early adopter of the government G-Cloud plan; and we examine the key challenges for network architects. Download the new issue now. 
(EZINE)

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap by SearchExchange.com

June 19, 2009 - (Free Research)
Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process. 
(EBOOK) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

EIU Report: Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

January 31, 2011 - (Free Research)
This research report explains how to ensure long-term viability in the financial services industry by depending on your ability to invest wisely in projects, meet regulatory targets and avoid the costly and public failures that brought down so many other organizations in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

5 Keys to a Successful Identity and Access Management Implementation by CA Technologies.

December 2007 - (Free Research)
An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation. 
(WHITE PAPER) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Integrated Solutions for Defect and Project Tracking by TechExcel

June 2008 - (Free Research)
This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market. 
(WHITE PAPER) READ ABSTRACT |

Password Management Project Roadmap by Hitachi ID Systems, Inc.

June 2010 - (Free Research)
As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project. 
(WHITE PAPER) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Implementing ITIL Using the PMBOK Guide in Four Repeatable Steps by Global Knowledge

January 2006 - (Free Research)
This white paper provides an overview of the PMBOK® and the key process areas and functions within the IT Infrastructure Library. 
(WHITE PAPER) READ ABSTRACT |

February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment” by Information Security Magazine

January 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation. 
(EGUIDE) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

February 2009 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts