Security Risk Index New YorkWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Risk Index New York returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Data Center Management
 •   Application Security
 •   Endpoint Security
 •   Anti-Spam
 •   Anti-Virus Solutions

Related Searches
 •   Basic Security Risk Index
 •   Compare Security Risk Index
 •   Free Security
 •   Reporting Security Risk
 •   Security Calendars
 •   Security Reporting
 •   Security Risk Impact
 •   Security Risk Index Address
 •   Security Risk Index Demos
 •   Security Risk Measurement
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Introduction to Virtualization E-book, Chapter 6: How Virtual Infrastructures Change Security by SearchServerVirtualization

October 26, 2009 - (Free Research)
Protecting the virtual data center doesn't need to be any more difficult than protecting a physical network. The key is to remain vigilant. In this chapter, you'll learn how to mitigate potential security risks to your resource pool and virtual machines without over-allocating administration. 
(EBOOK) READ ABSTRACT |

Establishing a trusted, secure cloud with Dell Crowbar, OpenStack and Intel TXT by Dell, Inc. and Intel®

July 22, 2013 - (Free Research)
In this brief white paper, explore a scalable open source cloud platform that simplifies the installation, configuration, and management of cloud environments with policy and compliance capabilities as organizations look to securely transition to cloud computing. 
(WHITE PAPER) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 21, 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by Thawte Inc.

May 19, 2011 - (Free Research)
Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet. 
(EGUIDE) READ ABSTRACT |

New York Stock Exchange Chooses Juniper for Next-Generation Datacenters by Juniper Networks, Inc.

July 11, 2009 - (Free Research)
This IDC Buyer Case Study examines the decision of NYSE Euronext to choose Juniper Networks as the primary supplier for the company's datacenter, Ethernet switching, and routing needs. Read on to learn more about how Juniper Networks is bringing the New York Stock Exchange into the twenty-first century. 
(CASE STUDY) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Rethinking Backup and Recovery: Business Continuity in the Datacenter and Beyond by Asigra

April 24, 2014 - (Free Research)
This on-demand webinar explains the challenges of the modern data center in terms of developing a business continuity strategy that can handle backing up all of the data from new devices and apps. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 13, 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

NYC HHS by Novell, Inc.

May 11, 2011 - (Free Research)
When New York City Health and Human Services was looking for a new log management solutions that would provide them with security for their sensitive information and make it easier to comply to state, federal, and industry regulations they did not expect to find a system that would do all that and more. 
(CASE STUDY) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 09, 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 01, 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: State of New York Government Case Study by McAfee, Inc.

October 14, 2009 - (Free Research)
Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

IDC Vendor Spotlight - Using a Hosted Service for Holistic Email Management by Mimecast

November 2008 - (Free Research)
Effective email management solutions provide a holistic approach that encompasses the related issues of archiving, business continuity, and security. 
(WHITE PAPER) READ ABSTRACT |

CARCO Delivers Higher Customer Satisfaction and Saves $1 Million with NetApp by NetApp

December 2011 - (Free Research)
Holtsville, New York-based CARCO Group Inc. and its three divisions provide investigative, fraud detection, and risk mitigation services to large corporations, producing more than two million reports each year. This case study explores how CARCO deployed NetApp unified storage to support their virtualized infrastructure and file workloads. 
(WHITE PAPER) READ ABSTRACT |

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation by Thawte Inc.

January 2014 - (Free Research)
In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections. 
(EGUIDE) READ ABSTRACT |

Case Study: New York Philharmonic Digital Archives to Preserve and Make Accessible Worldwide Over 160 Years of American Cultural Heritage with the help of Technology Services Group and Alfresco Software by Alfresco Software

May 2012 - (Free Research)
This resource examines how the New York Philharmonic digitized their enormous collections to provide universal online access with a robust, scalable document management system. 
(WHITE PAPER) READ ABSTRACT |

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report by Neustar®

May 2014 - (Free Research)
This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Keep Cloud Compliant by SearchCompliance.com

September 2013 - (Free Research)
Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines. 
(EBOOK) READ ABSTRACT |

Flushing Bank Invests in Internet Security with Webroot by Webroot

September 2011 - (Free Research)
New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers. 
(CASE STUDY) READ ABSTRACT |

BlueCross BlueShield Case Study: A Health Approach to Server Sprawl by Dell, Inc.

April 2009 - (Free Research)
Read this case study to learn how Dell helped BlueCross BlueShield of Western New York harness blades to shrink its data center footprint by 75 percent and improve efficiency by more than 50 percent. 
(CASE STUDY) READ ABSTRACT |

Case Study: North York General Hospital Doubles Storage Performance: Cutting Costs and Simplifying Management by Standardizing on IBM XIV by IBM

August 2011 - (Free Research)
This case study details how North York General Hospital's implementaiton of the IBM XIV Storage Systemen helped them reduce rackspace requirements and cut data center hosting costs. They now have a fast, resilient and flexible storage architecture that will support their mission-critical IT systems for years to come. 
(CASE STUDY) READ ABSTRACT |

Certifiedmail Managed Service by DataMotion

February 2011 - (Free Research)
Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts