Strategies What Is SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Strategies What Is Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Network Security
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Mobile Device Management
 •   Enterprise Systems Management
 •   Security Monitoring

Related Searches
 •   Plan Strategies
 •   Profile Strategies
 •   Schedule Strategies What
 •   Strategies Codes
 •   Strategies Customer
 •   Strategies Rfi
 •   Strategies Technical
 •   Strategies What Is Email
 •   Strategies What Is Standard
 •   Strategies What Is Wireless
Advertisement

ALL RESULTS
1 - 25 of 440 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Managing the iPad in the Enterprise by SearchSecurity.com

December 13, 2011 - (Free Research)
This Tech Guide discusses mobile strategies in the enterprise: manageability, cost, business benefits and - most important - how employees are dictating the need for it. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Mobility Advantage: Why Secure Your Mobile Devices by Sybase, an SAP company

May 31, 2011 - (Free Research)
The use of enterprise mobile devices is on the rise yet few companies have a mobile security strategy. Get this paper now and see how you can protect your mobile devices and data from unwanted eyes. 
(WHITE PAPER) READ ABSTRACT |

Balancing Cost, Risk and Complexity in Your Disaster Recovery Strategy by CommVault Systems, Inc.

February 27, 2014 - (Free Research)
This guide goes over the requirements for a suitable Disaster Recovery strategy and highlights the fact that traditional backup plans aren't capable of dealing with new technologies. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Client Hypervisors by Citrix

June 28, 2010 - (Free Research)
This presentation transcript features virtualization expert Brian Madden. Learn when and when not to deploy desktop virtualization and gain insight into the two types of client VMs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Why client hypervisors? by Citrix

June 25, 2010 - (Free Research)
This mediacast features virtualization expert Brian Madden.  Learn when and when not to deploy desktop virtualization and gain insight into the two types of client VMs. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Unified Approach to Managing the Virtual Environment by Forsythe

December 04, 2009 - (Free Research)
In this presentation transcript, learn about a unified approach to IT management. Discover how to decrease complexity introduced by virtualization and cloud computing to ensure optimal performance of your virtual and physical environments. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Defining and Enforcing a Clear Mobile Device Security Policy by SearchSecurity.com

February 18, 2013 - (Free Research)
If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more. 
(EGUIDE) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now. 
(EZINE) READ ABSTRACT |

Perceptions about Network Security: Ponemon research by Juniper Networks, Inc.

February 2012 - (Free Research)
Ponemon Institute conducted a survey of over a thousand IT and IT security practitioners across Europe, studying their perspectives about the current threat landscape and what they believe the most effective strategies for keeping networks safe include. Uncover key findings and leverage this knowledge to build the right strategy for your business. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Cloud Security Myths and Strategies Uncovered by VMware, Inc.

January 2012 - (Free Research)
Security and compliance is the most often-cited barrier to cloud adoption. Read what David Hunter, CTO of Platform Security from VMware, and Art Coviello Jr., Executive Chairman of RSA, say about ensuring control and visibility in a secure cloud. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

Malicious JavaScript Attacks: What Can You Do? by Sophos, Inc.

January 2011 - (Free Research)
We’ll review what to watch for, as well as the security strategies that will help keep you safe. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013) by IBM

October 2013 - (Free Research)
This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery and the Cloud: Are you prepared? by Symmetry Corporation (E-mail this company)

October 2011 - (Free Research)
Check out this E-Guide for key considerations when drawing up a DR plan and to learn how the cloud can work into such a strategy. You'll also learn what types of organizations can most benefit from DR in the cloud. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems by Safestone Technologies

March 2011 - (Free Research)
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage. 
(EBOOK)

Building a Better Network Security Strategy by Hewlett-Packard Company

January 2014 - (Free Research)
This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Taking Charge of Security in a Hyperconnected World by RSA, The Security Division of EMC

October 2013 - (Free Research)
Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company by Oracle Corporation

December 2010 - (Free Research)
This e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data. 
(EBOOK)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality by TippingPoint

August 2009 - (Free Research)
This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world. 
(WHITE PAPER) READ ABSTRACT |

What’s the Best Focus for MDM Strategy Now? by SearchSecurity.com

March 2014 - (Free Research)
This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters. 
(EBOOK) READ ABSTRACT |

1 - 25 of 440 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts