Security ROI Standards PartWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security ROI Standards Part returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Storage Security
 •   Technology ROI Tools
 •   Business Intelligence Solutions
 •   Wireless Technologies and Mobile Computing
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Formats Security
 •   Knowledge Security ROI
 •   Security Notes
 •   Security ROI Standards Articles
 •   Security ROI Standards Commercial
 •   Security ROI Standards Open
 •   Security ROI Standards Procurement
 •   Security ROI Types
 •   Security Wisconsin
 •   Uk Security ROI Standards
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

British American Tobacco Builds SAP® Intelligence into Its Executives’ BlackBerry® Smartphones by 3i Solutions

September 2010 - (Free Research)
British American Tobacco needed to enable its global executives to manage essential SAP business processes via their BlackBerry anytime, anywhere. By executing business processes while traveling, executives can spend more of their time collaborating with colleagues, making critical business decisions and adding value when they are in the office. 
(CASE STUDY) READ ABSTRACT |

ROI of Switched Ethernet Networking Solutions for the Midmarket by Hewlett-Packard Company

August 2010 - (Free Research)
To determine the return on investment (ROI) associated with implementation of an HP ProCurve network solution, IDC conducted a study of medium-sized to large organizations with an HP ProCurve implementation up and running in their production environment. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Developing Your Cloud Strategy by Intel

August 2011 - (Free Research)
This transcript looks at five key factors you need to consider as you begin putting together a cloud strategy. Jeffrey Ritter focuses on what is required to better assure any investment in the cloud will return the projected ROI. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Securing Your Business with Your Network: Security Made Simple by Cisco Systems, Inc.

December 2006 - (Free Research)
Network security is essential for your business because it allows employees and vendors to access company voice and data services over a secure network connection, wherever they may be located. Read this paper to learn how to secure your business network 
(BROCHURE) READ ABSTRACT |

New Security Solutions Using Intel vPro Technology by Intel Corporation

April 2009 - (Free Research)
Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case. 
(WHITE PAPER)

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Desktop Delivery: Making Desktop Virtualization Work by Citrix

August 2008 - (Free Research)
This whitepaper discusses Desktop Virtualization and the impact on desktop management. It explores the challenges for desktop management in a pre-Desktop Virtualization world and issues that are not well addressed by Desktop Virtualization. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

B2B Collaboration: Assessing the ROI of Process Integration Business Value Research Series by Sterling Commerce Manufacturing Solutions

March 2008 - (Free Research)
Business and IT leaders are under increasing pressure to improve B2B collaboration and the electronic communication capabilities of their organizations. This report looks at the key drivers for B2B collaboration in both the purchase-to-pay and... 
(WHITE PAPER) READ ABSTRACT |

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications by Intermec

March 2009 - (Free Research)
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations. 
(WHITE PAPER) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

The Return on Investment of Payment Card Industry Data Security Standards Compliance by IBM

June 2009 - (Free Research)
Compliance with PCI DSS has become a global requirement for any business or entity that processes credit card transactions as payment for goods and services. This paper explores the ROI implications and opportunities of PCI. 
(WHITE PAPER) READ ABSTRACT |

Top Four Considerations for Securing Microsoft SharePoint by Sophos, Inc.

March 2011 - (Free Research)
Microsoft SharePoint is now the standard for internal and external collaboration and content management in much the same way Microsoft Exchange has become the enterprise standard for email. And like Exchange, SharePoint comes with a similar set of adoption challenges: The need to maximize ROI, protect against malware and data loss and establish... 
(WHITE PAPER) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.

October 2010 - (Free Research)
In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security. 
(WHITE PAPER) READ ABSTRACT |

The Best PCI Audit of Your Life by Lumension

August 2009 - (Free Research)
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall by Riverbed Technology, Inc.

January 2012 - (Free Research)
PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 2008 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

BPM E-Guide: Part I: The rise of BPM for Process Modeling, Part II: BPMN 2.0: The emerging star of business process modeling by TechTarget

May 2014 - (Free Research)
Process modeling standards have grown more important over time, especially given that businesses have sought tools that could enhance their ability to create models and build systems. Take this 2 min survey to access this expert guide on BPMN's evolution and why BPMN use is increasing and where the standard is likely to be headed. 
(RESOURCE) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts