Security ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Review returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Load, Stress & Performance Testing
 •   Enterprise Data Protection and Privacy
 •   Automated Security Auditing/ Source Code Analysis
 •   Data Replication and Mirroring
 •   Vulnerability Assessment
 •   Treasury / Cash / Risk Management
 •   Access Control

Related Searches
 •   Backup Security
 •   Development Security
 •   Improvements Security Review
 •   Plans Security Review
 •   Security Find
 •   Security Review Communication
 •   Security Review Content
 •   Security Review Finding
 •   Security Review Plan
 •   Security Review Schedules
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Patch Tuesday Alerts by Lumension

July 2008 - (Free Research)
Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible. 
(PRESS RELEASE) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Introspect: Leads the Market in Streamlined Capture, Review and Production of ESI for FRCP Compliance by ZANTAZ

January 2008 - (Free Research)
ZANTAZ Introspect offers the highest level of security for your organization's discoverable data. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.

February 2009 - (Free Research)
Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security. 
(WHITE PAPER) READ ABSTRACT |

Sentinel Log Manager Review by Novell, Inc.

July 2010 - (Free Research)
This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities. 
(WHITE PAPER) READ ABSTRACT |

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today by NetIQ

March 2012 - (Free Research)
This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more. 
(WHITE PAPER) READ ABSTRACT |

Solving the Password Management Paradox: Defining the Problem and Reviewing the Four Best-Known Solutions by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This paper discusses the paradox of strong password policies, evaluates several possible solutions, and recommends a password management solution that is cost effective and easy to implement. 
(WHITE PAPER) READ ABSTRACT |

Security Intelligence: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform by LogRhythm, Inc.

December 2012 - (Free Research)
This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Virus Bulletin: Comparative Reviews August-December 2010 by ESET

December 2010 - (Free Research)
Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC

February 2012 - (Free Research)
This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more. 
(WHITE PAPER) READ ABSTRACT |

Exchange Server: E-mail Archiving and Security by Mimecast

March 2013 - (Free Research)
Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

The Evolving Threat Landscape by Juniper Networks, Inc.

September 2011 - (Free Research)
This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective. 
(WHITE PAPER) READ ABSTRACT |

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks by Palo Alto Networks

March 2013 - (Free Research)
This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts