Tool Affinium SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Tool Affinium Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Endpoint Security
 •   Application Security
 •   Network Management
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Systems Management

Related Searches
 •   Operating Tool Affinium Security
 •   Outsourcing Tool
 •   Plans Tool Affinium
 •   Tool Affinium Security Desktop
 •   Tool Affinium Security Manage
 •   Tool Affinium Solution Software
 •   Tool Benefits
 •   Tool Event
 •   Tool Issues
 •   White Papers Tool Affinium Security
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 26, 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 20, 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 07, 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

A Pragmatic Approach to SIEM by Tripwire, Inc.

February 08, 2011 - (Free Research)
In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools by IBM

August 25, 2011 - (Free Research)
Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools. 
(EGUIDE) READ ABSTRACT |

Provide Better Visibility and Manageability across Network Security Tools by WatchGuard Technologies, Inc.

September 30, 2013 - (Free Research)
Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment. 
(ANALYST REPORT) READ ABSTRACT |

Understanding and Selecting a Data Loss Prevention Solution by Websense, Inc.

July 1967 - (Free Research)
Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization. 
(ANALYST REPORT) READ ABSTRACT |

Application Discovery Tool by Sophos, Inc.

February 2008 - (Free Research)
With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software. 
(TRIAL SOFTWARE)

Agile tools: True support for ALM by IBM

June 2012 - (Free Research)
This expert e-guide offers tips and tricks for putting yourself in the agile frame of mind when using ALM tools. Read this now and learn about the qualities and attributes that make development, testing, QA, requirements management, version control, security and other ALM process tools agile. 
(EGUIDE) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by IBM

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

What you need in a file syncing tool by GroupLogic

March 2012 - (Free Research)
File syncing is commonly used for both corporate-created data and employee-created corporate data. Finding one tool that could be used for both would be extremely helpful. In this expert E-Guide from SearchConsumerization.com, discover what you should look for in a file syncing tool. 
(EGUIDE) READ ABSTRACT |

10 Network Security Tools and Tests Everyone Should Use by Global Knowledge

April 2014 - (Free Research)
This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

One Tool to Manage Endpoint Security Across Entire Organization by IBM

March 2013 - (Free Research)
This guide explores how an efficient endpoint management tool can enhance end-user experience, enhance productivity, reduce risk and increase visibility. 
(WHITE PAPER) READ ABSTRACT |

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva

April 2014 - (Free Research)
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool. 
(EGUIDE) READ ABSTRACT |

Sophos Virus Removal Tool: Free virus detection and removal by Sophos, Inc.

May 2013 - (Free Research)
Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily. 
(TRIAL SOFTWARE) READ ABSTRACT |

Secure Remote Access Tools and Techniques by TechTarget

March 2014 - (Free Research)
Ensuring flexibility to your users while implementing effective remote access tools is extremely challenging without potentially sacrificing security. Take this survey to access this guide providing essential tips and criteria to utilize when evaluating remote desktop access software and how to leverage it as a remote access security strategy. 
(RESOURCE)

Technical Guide on Application Security by SearchSecurity.com

December 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

SANS Security Analytics Survey by Hewlett-Packard Company

September 2013 - (Free Research)
In this analyst report by SANS, survey results indicate the need for security teams to detect and react more quickly to today's advanced threats. Learn why it's essential to invest in better security information and event management tools that offer advanced analytics and big data processing to accommodate data growth. 
(ANALYST REPORT) READ ABSTRACT |

Automated Log Analytics Critical For Security and Compliance Management by VMware, Inc.

June 2013 - (Free Research)
Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management. 
(WHITE PAPER) READ ABSTRACT |

New Podcast: Adding Context to Security Alerts by Solera Networks

April 2010 - (Free Research)
In this podcast you’ll learn how network forensics can integrate with other security tools to provide context to any alert. 
(PODCAST) READ ABSTRACT |

Log Management and SIEM: Build a Solid Foundation for Compliance by McAfee, Inc.

November 2012 - (Free Research)
This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more. 
(EGUIDE) READ ABSTRACT |

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies by SearchSecurity.com

December 2008 - (Free Research)
Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense. 
(EBOOK) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts