Security Trends ProfessionalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Trends Professional returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Endpoint Security
 •   Security Monitoring
 •   Managed Security Services
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Mobile Device Management

Related Searches
 •   Budget Security Trends Professional
 •   Database Security Trends
 •   Provider Security Trends
 •   Security Databases
 •   Security New Jersey
 •   Security Trends Owning
 •   Security Trends Professional Procurement
 •   Security Trends Size
 •   Security Trends Supplier
 •   Skills Security Trends Professional
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The 2008 (ISC)2 Global Information Security Workforce Study by ISC2

May 2008 - (Free Research)
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide. 
(WHITE PAPER) READ ABSTRACT |

IT Security Trends 2013: Mobile security concerns tops the list by SearchSecurity.com

November 2013 - (Free Research)
This expert resource takes an in-depth look at the security trends and priorities of 2013, discussing the shift away from old-school defenses and the central role that mobile security has taken in today's strategies. 
(WHITE PAPER) READ ABSTRACT |

Security Trends 2014 by Global Knowledge

February 2014 - (Free Research)
In this resource, find out what you need to know about security trends in 2014. 
(WHITE PAPER) READ ABSTRACT |

Security Trends 2014 by Global Knowledge

February 2014 - (Free Research)
In this resource, find out what you need to know about security trends in 2014. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

Web Application Security Trends Report Q3-Q4, 2008 by Cenzic

May 2009 - (Free Research)
Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers. 
(WHITE PAPER) READ ABSTRACT |

Mobile: The Technology Game-Changer in 2013 by SearchSecurity.com

February 2013 - (Free Research)
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization. 
(EGUIDE) READ ABSTRACT |

Emerging Security Trends and Risks: Insights for the Business Executive by IBM

June 2012 - (Free Research)
This report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Ovum: Security trends to watch in 2011 by ComputerWeekly.com

January 2011 - (Free Research)
Security needs are growing fast. Businesses are facing a large-scale and well-resourced criminal network intent on defrauding them and their customers. On top of this there is the growing threat of cyber espionage, and the need to meet ever more stringent compliance benchmarks. 
(WHITE PAPER) READ ABSTRACT |

Data Protection: Solutions for Privacy, Disclosure and Encryption by Trend Micro, Inc.

July 2010 - (Free Research)
Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details. 
(WHITE PAPER) READ ABSTRACT |

IBM X-Force 2010 Trend and Risk Report by IBM

May 2011 - (Free Research)
This IBM X-Force offers latest security trends to help you better understand how to protect your systems and networks and offers ways to improve your security strategy. Read this report for an overview of latest security threats and how to detect them, operate a secure infrastructure, develop secure software, and more. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: Physician Organization Secures VMware Virtualized Environment with Trend Micro Deep Security  by Trend Micro

October 2009 - (Free Research)
This case study illustrates how a physicians' organization providing medical management services to 1,500 members was able to introduce Trend Micro's Deep Security solution and achieve increased security, increased flexibility, reduced costs, streamlined administration, and easy scalability. 
(CASE STUDY) READ ABSTRACT |

State of Software Security Report Volume 4 by Veracode, Inc.

December 2011 - (Free Research)
Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors. 
(WHITE PAPER) READ ABSTRACT |

2010: Cybercrime Coming of Age by ESET

January 2010 - (Free Research)
In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of the Enterprise…And Enterprise Security by Fortinet, Inc.

March 2014 - (Free Research)
This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

IBM X-Force Threat Intelligence Quarterly - 1Q 2014 by IBM

February 2014 - (Free Research)
This report highlights the most critical threat incidents that occurred in 2013, and what these trends show for the upcoming year in approaches to security. 
(WHITE PAPER) READ ABSTRACT |

Meeting the challenges of virtualisation security by Trend Micro

August 2009 - (Free Research)
Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges. 
(WHITE PAPER) READ ABSTRACT |

Symantec Intelligence Report - June 2013 by Symantec Corporation

June 2013 - (Free Research)
This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches. 
(WHITE PAPER) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today by NetIQ

March 2012 - (Free Research)
This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more. 
(WHITE PAPER) READ ABSTRACT |

WebSense Security Lab: Zero-Day in Critical Vulnerability by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

Accenture Technology Vision 2012 by ComputerWeekly.com

January 2012 - (Free Research)
Download this report from Accenture to discover the 6 IT technology trends that will impact CIOs in 2012. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts