Security Used GeorgiaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Used Georgia returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Policies
 •   Vulnerability Assessment
 •   Data Center Management
 •   Endpoint Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Anti-Virus Solutions
 •   Storage Management

Related Searches
 •   Content Security Used Georgia
 •   Crm Security Used
 •   Employee Security Used
 •   Intranet Security
 •   Introduction Of Security Used
 •   Learning Security
 •   Research Security Used Georgia
 •   Security Calls
 •   Security Skills
 •   Security Used Size
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Cloud Web Security Using Cisco ASA by Cisco Systems, Inc.

April 23, 2014 - (Free Research)
This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy. 
(WHITE PAPER) READ ABSTRACT |

The Urgent Need to rethink Security Using the Cloud by Qualys

February 28, 2012 - (Free Research)
This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Why Traditional Anti-Malware Solutions Are No Longer Enough by AVG Technologies USA, Inc.

November 17, 2009 - (Free Research)
Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap. 
(WHITE PAPER) READ ABSTRACT |

University of Georgia Gets Lesson: NetVault™ Makes the Grade in Power, Ease of Use by BakBone

April 2008 - (Free Research)
UGA evaluated several companies backup/restore software, before choosing BakBone Software NetVault. This case study examines why UGA opted for BakBone software. 
(CASE STUDY) READ ABSTRACT |

University of Northern Georgia case study: Life made easier for thousands of students and teachers by Dell, Inc.

September 2013 - (Free Research)
This informative paper explores how a university easily and affordably virtualized its network, data center and storage systems. Read on to learn the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

New Security Solutions Using Intel vPro Technology by Intel Corporation

April 2009 - (Free Research)
Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case. 
(WHITE PAPER)

New Security Solutions Using Intel® vPro™ Technology by Intel

February 2012 - (Free Research)
This white paper introduces a new technology aimed at increasing your ability to manage, maintain and protect PCs without burdening your budget. Learn all about its ability to securely manage PCs over various networks and discover 10 additional security use cases for this advanced platform.    
(WHITE PAPER)

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

Survival Guide: Securing Networks without Borders Show by Cisco Systems, Inc.

November 2009 - (Free Research)
In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them 
(WEBCAST) READ ABSTRACT |

IT Security Case Studies by ComputerWeekly.com

June 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

Application Virtualization Delivers Cost-saving IT Solution for Georgia’s K-12 Peach County Education District by InstallFree Inc.

January 2010 - (Free Research)
As the systems and hardware continue to be replaced and upgraded, the incremental effort is minimal, even when moving to new versions of the operating system. The wireless system readily manages remote desktops using InstallFree, which links both the PC and the User to the virtual application. 
(CASE STUDY) READ ABSTRACT |

This Month in the Threat Webscape -- August 2009 by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics. 
(VIDEO) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

Expert Guide to web 2.0 Threats: How to Prevent an Attack by SearchSecurity.com

August 2011 - (Free Research)
A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology. 
(EGUIDE) READ ABSTRACT |

Information Security – May 2014 by SearchSecurity.com

April 2014 - (Free Research)
The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises? 
(EZINE) READ ABSTRACT |

Mobile ERP and Financials: Customers Tell All by Workday

September 2013 - (Free Research)
In this brief video, hear from real-world users -- including CareFusion, Chiquita Brands, and Community Health Services of Georgia -- of a mobile enterprise resource planning (ERP), financials, and human capital management (HCM) technology to explore the benefits they experience from mobile apps. 
(VIDEO) READ ABSTRACT |

Gwinnett Medical Center Relies on HP to Help Meet Care Goals: Leverages HP Storage and Server Solutions to Manage Growth and Costs by Hewlett-Packard Company

January 2009 - (Free Research)
In this case study you will learn the approach of Gwinnett to team with HP and other business technology leaders to develop and deploy innovative new solutions that promote quality care, cost efficiencies and service continuity. 
(CASE STUDY) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Next-generation firewalls and your security strategy by Cisco (E-mail this company)

April 2013 - (Free Research)
This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Using Reputation-based Anti-Spam Services for Email Security by IronPort Systems

February 2009 - (Free Research)
This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services. 
(WHITE PAPER) READ ABSTRACT |

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation

March 2009 - (Free Research)
This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators. 
(WHITE PAPER) READ ABSTRACT |

2010 Threat Report by Websense, Inc.

January 2011 - (Free Research)
Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats. 
(WHITE PAPER) READ ABSTRACT |

State of Internet Security, Q3 - Q4 2009 by Websense, Inc.

February 2010 - (Free Research)
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.

August 2011 - (Free Research)
Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts