Security Vs Risk PosWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Vs Risk Pos returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Security Policies
 •   Storage Security
 •   Endpoint Security
 •   Managed Security Services
 •   Intrusion Prevention Solutions
 •   Business Intelligence Solutions

Related Searches
 •   Computing Security
 •   Faqs Security Vs Risk
 •   Impact Security
 •   Internet-Based Security Vs
 •   Manuals Security Vs Risk
 •   Networks Security Vs Risk
 •   Productivity Security Vs
 •   Security Vs Metrics
 •   Security Vs Problems
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Lowering the Point of Sale System Support Costs with Intel® vPro™ Technology by Wipro Technologies

February 06, 2009 - (Free Research)
Written for retail IT organizations managing Point of Sale (POS) systems, this paper shows hard dollar savings that retailers can expect to see by adopting advanced POS systems with Intel® vPro™ technology. 
(ARTICLE) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Attacks on Point of Sales Systems by Symantec Corporation

March 11, 2014 - (Free Research)
Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS. 
(WHITE PAPER) READ ABSTRACT |

Detecting Zero-Day Exploits in the Wild by Websense

March 28, 2014 - (Free Research)
This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security. 
(WHITE PAPER) READ ABSTRACT |

Simplifying the Scope of the PCI Audit: How Cross-Platform Server Isolation Helps Retailers Achieve Compliance by Apani

February 2008 - (Free Research)
This paper will describe how Apani EpiForce can solve key aspects of the PCI compliance challenge. Apani® EpiForce® proactively eliminates vulnerabilities within the corporate network by isolating computers and the business-critical data, personal information and intellectual property stored on them into logical security zones. 
(ARTICLE) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

Fair exchange protocols with anonymity and non-repudiation for payments by ComputerWeekly.com

May 2013 - (Free Research)
This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Enterprise Time and Attendance - Build Vs. Buy by Infor

January 2007 - (Free Research)
Explore the advantages, disadvantages, costs and risks of buying and building an enterprise time and attendance solution. 
(WHITE PAPER) READ ABSTRACT |

Staying ahead of the Curve: Oracle Database 11g Vs. Microsoft SQL Server 2005 by Oracle Corporation

June 2008 - (Free Research)
The document shows that Microsoft has been slow to adapt to changing, real-world information needs and that SQL Server 2005 lacks some critical capabilities that are needed to both adapt to, and prepare for changes related to security. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy: A Holistic Approach by IBM

September 2011 - (Free Research)
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk. 
(WHITE PAPER) READ ABSTRACT |

The Truth about Agent Vs. Agentless Monitorinng: A Short Guide to Choosing the Right Solution by uptime software inc.

July 1967 - (Free Research)
When selecting an enterprise-level monitoring solution, one of the first decisions the IT department needs to make is whether to opt for an agent based, or agentless monitoring solution. This paper helps you arrive at a decision. 
(WHITE PAPER) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Paramount Foods Upgrades Store Technology by Hewlett-Packard Company

March 2008 - (Free Research)
Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers. 
(WHITE PAPER) READ ABSTRACT |

Stealthy Threats: Driving a New Approach to Security Video by Intel

October 2012 - (Free Research)
View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks. 
(WEBCAST) READ ABSTRACT |

Cloud Vs. Cloud: Which Side Are You On? by Webroot

November 2011 - (Free Research)
The jury is in, and cloud computing is here to stay. So the question for organizations both large and small is not: “to cloud or not to cloud,” but rather, when and what kind — public or private? 
(WHITE PAPER) READ ABSTRACT |

#CompliantData: The Social Media Data Archiving Conundrum by Iron Mountain

March 2012 - (Free Research)
Check out this white paper to discover how to set the stage for social media success - learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Using SaaS to Reduce the Costs of Email Security by Proofpoint, Inc.

February 2009 - (Free Research)
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach. 
(WHITE PAPER) READ ABSTRACT |

Tokenization Buyer's Guide by Intel

September 2011 - (Free Research)
PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs. 
(WHITE PAPER) READ ABSTRACT |

HP POS System Helps Mayors Improve Customer Service, Gain Selling Time by Hewlett-Packard Company

August 2008 - (Free Research)
Among the priorities for the new system were ease of use by salespeople, an easy-to-manage centralized customer database for lookup and validation, and the use of broadband connectivity. Maintaining access to proprietary applications that supported nonsales functions was also required. 
(CASE STUDY) READ ABSTRACT |

Post-Migration Best Practices: Exchange Environment Operation by Dell Software

April 2011 - (Free Research)
In this Quest white paper, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post-migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration management you must know. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 December 2011: Read this week’s issue, featuring: retail IT issues for Christmas; the cost of software failure; the founder of agile development by ComputerWeekly.com

December 2011 - (Free Research)
In this week's issue of Computer Weekly, we look at the key technologies that retailers are turning to for IT-enabling customers' Christmas shopping. We examine research revealing the huge cost of application software that fails to meet requirements; and we talk to one of the pioneers of agile software development. Download the new issue now. 
(EZINE) READ ABSTRACT |

Presentation Transcript: Cloud vs. Tape Backup by Iron Mountain

June 2012 - (Free Research)
Get Jon Toigo's take on cloud vs. tape backup in this presentation transcript. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Exploring Various Data Backup Solutions by Druva Software

February 2014 - (Free Research)
Take a look at this expert e-guide to find out which backup and recovery solution for mobile devices is best suited for your needs. 
(EGUIDE) READ ABSTRACT |

Inter-array tiering : HP vs. HDS vs. EMC by SearchStorage.com

March 2012 - (Free Research)
This guide explores inter-array storage tiering, and provides both an overview of storage tiering as a whole as well as a breakdown of three of today's top storage vendors' offerings in this space. Discover the pros and cons associated with this technology, and learn what direction this market may be headed toward in the future. Read on for more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts