Support Information SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Support Information Security returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Storage Security
 •   Enterprise Dashboards
 •   Unified Communications / Voice & Data Convergence
 •   Enterprise Information Integration/ Metadata Management
 •   Service Oriented Architecture (SOA)
 •   Security Policies

Related Searches
 •   Charts Support Information
 •   Spreadsheets Support
 •   Support Consultancy
 •   Support Information Calendar
 •   Support Information Demonstration
 •   Support Information Finding
 •   Support Information Order
 •   Support Information Security Budgeting
 •   Support Schedule
 •   Support Us
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Supporting information technology risk management by IBM

October 01, 2011 - (Free Research)
Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions. 
(WHITE PAPER) READ ABSTRACT |

Determining Total Cost of Ownership for Data Center and Network Room Infrastructure by APC by Schneider Electric

April 30, 2009 - (Free Research)
Predicting and measuring Total Cost of Ownership (TCO) for the physical infrastructure for network rooms and data centers is required for ROI analysis and other business decision processes. This paper describes a method for determining TCO of physical data center and network room infrastructure including power, cooling and protection. 
(WHITE PAPER) READ ABSTRACT |

Secure Search: Balancing Security with the Need for Information Access by EMC Corporation

May 01, 2008 - (Free Research)
This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search. 
(WHITE PAPER) READ ABSTRACT |

Smarter Business Planning & Transformation: Attain Maximum Value from Your Enterprise Architecture by IBM

August 12, 2010 - (Free Research)
Using the information contained within an EA, stakeholders can identify innovation initiatives – freeing funds through optimization initiatives, or developing new opportunities. This white paper provides an overview of EA and highlights how an actionable EA approach from IBM can maximize organizational agility, and more.  
(WHITE PAPER) READ ABSTRACT |

Fact or Fiction: The Future of Email Attacks by Symantec Hosted Services

October 31, 2006 - (Free Research)
In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks. 
(PODCAST) READ ABSTRACT |

Collaborative Care beyond the Care Continuum by IBM

March 14, 2014 - (Free Research)
This guide explores the current state of collaborative care and the IT services and technologies you'll need to carry it out. 
(WHITE PAPER) READ ABSTRACT |

Universitätsklinikum Erlangen strengthens analytics expertise and focuses on a customised healthcare analytics solution by IBM

April 11, 2013 - (Free Research)
View this white paper to learn how one company strengthened analytics by developing a focus on customised healthcare. It linked to relevant operational systems, how to optimise information flow and how to support the overall strategic control of the hospital at just the touch of a button. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 01, 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

InfoSphere Optim Data Redaction by IBM

August 23, 2011 - (Free Research)
As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information?  In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

Offsite Tape Vaulting: The Services You Need, When You Need Them by Iron Mountain

May 2011 - (Free Research)
At Iron Mountain, our goal is to provide you with capabilities — in addition to our Offsite Tape Vaulting service — that support your organization’s information management needs. Part of this commitment is providing the services and support that help you address specific data protection, disaster recovery or media management scenarios. 
(DATA SHEET) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

ASG-Rochade the Leading Metadata Repository by ASG Software Solutions

ASG-Rochade is a metadata management solution for large and medium-sized organizations. It is a strategic, facilitating technology that manages information about data and systems across your enterprise. 
(SOFTWARE PRODUCT)

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by Alcatel-Lucent

April 2008 - (Free Research)
The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations. 
(WEBCAST) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

Information security breaches survey 2012 by ComputerWeekly.com

April 2012 - (Free Research)
Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey. 
(IT BRIEFING) READ ABSTRACT |

Rethinking Information Security to Improve Business Agility by Intel

March 2011 - (Free Research)
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Essentials Series: Security Information Management by SecureWorks

October 2009 - (Free Research)
This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.

February 2011 - (Free Research)
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts