Solutions SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Solutions Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Endpoint Security
 •   Managed Security Services
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Wireless Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Anti-Virus Solutions

Related Searches
 •   Contracts Solutions Security
 •   Public Solutions Security
 •   Solutions Data
 •   Solutions Importing
 •   Solutions Mapping
 •   Solutions Security Calendar
 •   Solutions Security Environment
 •   Solutions Security Problems
 •   Solutions Security Schedules
 •   Strategies Solutions Security
Advertisement

ALL RESULTS
1 - 25 of 499 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Fortinet's Data Center Solution: Security From the Edge to the Core by Fortinet, Inc.

December 31, 2013 - (Free Research)
This white paper highlights the features and benefits of a security platform that defends the network core and edge to better protect data centers from today's latest risk factors. 
(WHITE PAPER) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

WEP Cloaking for Legacy Encryption Protection by Motorola, Inc.

November 2008 - (Free Research)
Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution. 
(ANALYST REPORT) READ ABSTRACT |

Knowledge of threats and vulnerabilities by IBM

September 2010 - (Free Research)
IBM Security Solutions are built on the Secure by Design philosophy, which states that IT infrastructure should be designed, created and operated with security in mind. This paper focuses on how IBM helps clients understand the threat landscape and vulnerabilites. 
(WHITE PAPER) READ ABSTRACT |

Are You Securely Delivering Enterprise Data and Services? by Webroot

November 2011 - (Free Research)
Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information. 
(WHITE PAPER) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

IBM X-Force 2010 Trend and Risk Report by IBM

May 2011 - (Free Research)
This IBM X-Force offers latest security trends to help you better understand how to protect your systems and networks and offers ways to improve your security strategy. Read this report for an overview of latest security threats and how to detect them, operate a secure infrastructure, develop secure software, and more. 
(ANALYST REPORT) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

McAfee Deep Defender: Hidden Malware Protection by Intel

January 2013 - (Free Research)
This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more. 
(WEBCAST) READ ABSTRACT |

IT Decision Checklist: Antimalware by ESET

October 2011 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today. 
(EGUIDE) READ ABSTRACT |

Policy-Based Acceleration for all Business Applications – including SSL – while adding Security and Control by BlueCoat

March 2011 - (Free Research)
Richardson Partners Financial Limited deployed Blue CoatSG appliances at its datacenter and branch offices to eliminate latency problems with applications, reduce overall bandwidth consumption and provide security and control. 
(WHITE PAPER) READ ABSTRACT |

IT Decision Checklist: Antimalware by ESET

June 2010 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more. 
(EGUIDE) READ ABSTRACT |

Leading the Way in Managed Services by Zenith Infotech

June 2008 - (Free Research)
Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients. 
(WHITE PAPER) READ ABSTRACT |

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention by EMC Computer Systems (UK) Ltd.

April 2011 - (Free Research)
This white paper from EMC takes a closer look at the advantages associated with a disk-based backup solution. Read on to learn more today! 
(WHITE PAPER) READ ABSTRACT |

Guide: Desktop Authority by ScriptLogic Corporation

August 2009 - (Free Research)
Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership. 
(WHITE PAPER) READ ABSTRACT |

Mobility, Virtualization and the Next-Generation Workplace by Cisco Systems, Inc.

June 2012 - (Free Research)
By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Email is Your Biggest Risk by TITUS

December 2012 - (Free Research)
In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Log Management Tightens Data Security, Performance by SearchCompliance.com

April 2013 - (Free Research)
For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance. 
(EBOOK) READ ABSTRACT |

LogRhythm’s Security Intelligence Platform by LogRhythm, Inc.

April 2014 - (Free Research)
This brief guide explores one company's top-tier security intelligence platform and the essential security tools it provides. 
(WHITE PAPER) READ ABSTRACT |

Managing Mobile Devices: The New MSP Opportunity by N-able Technologies

December 2012 - (Free Research)
This exclusive resource explores how MSPs manage the proliferation of mobile computing in the workplace and the implementation of a mobile manager approach that integrates MDM with RMM, strengthening customer relationships and boosting business longevity. 
(WHITE PAPER) READ ABSTRACT |

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com

October 2013 - (Free Research)
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security. 
(EBOOK) READ ABSTRACT |

The Dynamic Duo: SAM & Security by CDW Corporation

April 2014 - (Free Research)
This whitepaper offers software asset management as a solution that can meet new licensing and security challenges. 
(WHITE PAPER) READ ABSTRACT |

The Intersection of SAM and Security by CDW Corporation

March 2014 - (Free Research)
This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex. 
(WHITE PAPER) READ ABSTRACT |

Buyer's Criteria for Next-Generation Network Security by Sourcefire

December 2013 - (Free Research)
This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 499 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts