Security User GovernmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security User Government returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Managed Security Services
 •   Application Security
 •   Wireless Technologies and Mobile Computing
 •   Security Policies
 •   Virtualization
 •   Security Monitoring
 •   Wireless Security

Related Searches
 •   Conferences Security User
 •   Performance Security User Government
 •   Schemas Security User
 •   Search Security User Government
 •   Security Customer
 •   Security Measures
 •   Security User Government Computerized
 •   Security User Government Repairs
 •   Security User Government Training
 •   Security User Licenses
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

IBM Tivoli Security User Compliance Management Demo by IBM

December 2008 - (Free Research)
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information. 
(DEMO)

DataShare by Excel Meridian Data, Inc.

DataShare is a dual-function server that performs both CD/DVD File Sharing tasks as well as NAS File Data Archiving. It is the first CD/DVD server available in the market that combines these unique features in one easy-to-use solution. 
(HARDWARE PRODUCT)

Building a Secure and Compliant Windows Desktop by BeyondTrust Corporation

May 2008 - (Free Research)
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights. 
(WHITE PAPER) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

Least Privilege Application Compatibility for Windows 7 Migrations by BeyondTrust Corporation

June 2010 - (Free Research)
This whitepaper will give you an overview of the new technology built into Windows 7 operating systems, and how this technology can help your enterprises complete your migration. We will also surface some of the confusion around what those technologies mean from a security perspective. 
(WHITE PAPER) READ ABSTRACT |

Podcast: End-to-End Secure Client to Cloud Access by Intel

March 2011 - (Free Research)
In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud. 
(PODCAST) READ ABSTRACT |

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security by BlueCoat

September 2010 - (Free Research)
Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are. 
(WHITE PAPER) READ ABSTRACT |

eBook: Moving to the Cloud by Google Apps

January 2011 - (Free Research)
When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps. 
(EBOOK) READ ABSTRACT |

eBook: Moving to the Cloud by Google Apps

July 2010 - (Free Research)
Content provided by Google. When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps. 
(WHITE PAPER) READ ABSTRACT |

What to Consider when Dealing with Desktop Virtualization over the WAN by F5 Networks

October 2011 - (Free Research)
Desktop virtualization deployments must be in sync with networking and security decisions to ensure an optimal user experience for WAN users. Hear what industry experts Brian Madden and Gabe Knuth have to say about specific desktop virtualization networking issues and application performance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Moving to the Cloud by Google

July 2010 - (Free Research)
When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps. 
(EBOOK) READ ABSTRACT |

Virtual Desktops and the Pano System by Pano Logic, Inc

November 2009 - (Free Research)
Pano Logic® is the first company to offer a complete, purpose-built solution for virtual desktops combining a unique zero-client endpoint device with centralized tools designed specifically for the tasks of deployment and managing virtual desktops. 
(WHITE PAPER) READ ABSTRACT |

The Ten Must Haves for Secure Mobile Device Management by Zenprise

August 2012 - (Free Research)
Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl by Oracle Corporation

March 2009 - (Free Research)
This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl. 
(WHITE PAPER) READ ABSTRACT |

PassMark Report: Enterprise Endpoint Security Performance Benchmarks by Symantec Corporation

November 2012 - (Free Research)
This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Content Monitoring in the Enterprise by Lumension

January 2013 - (Free Research)
This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Revolutionary architecture, evolutionary deployment by Cisco (E-mail this company)

February 2013 - (Free Research)
Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly – 8 April 2014: Cloud wars by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, cloud users are set to benefit from cheaper services as Google and Amazon start a price war. The mainframe is still not dead yet – we look at 50 years of the IBM mainframe. And we assess the latest attempt to encourage overseas IT experts to fill the UK's skills shortages. Read the issue now. 
(EZINE) READ ABSTRACT |

Presentation Transcript: WWW - World Wide Weaponization by ESET

November 2009 - (Free Research)
The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

WWW - World Wide Weaponization by ESET

October 2009 - (Free Research)
The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts