Tools Paper On SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Tools Paper On Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Security
 •   Endpoint Security
 •   Enterprise Systems Management
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Identity Management/ User Provisioning
 •   Fraud Detection & Prevention

Related Searches
 •   Conferencing Tools Paper On
 •   Free Tools
 •   Policies Tools
 •   Tools Delivery
 •   Tools Function
 •   Tools Paper On Batch
 •   Tools Paper On Cycle
 •   Tools Paper On Net
 •   Tools Paper On Office
 •   Tools Paper On Summary
Advertisement

ALL RESULTS
1 - 25 of 451 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

A Pragmatic Approach to SIEM by Tripwire, Inc.

February 08, 2011 - (Free Research)
In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box. 
(WHITE PAPER) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

ZeuS: A Persistent Criminal Enterprise by Trend Micro

March 2010 - (Free Research)
This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more. 
(WHITE PAPER) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation

March 2009 - (Free Research)
This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators. 
(WHITE PAPER) READ ABSTRACT |

Client Management Best Practices for Managing Mac Systems by CDW

April 2010 - (Free Research)
One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

Social Networking in the Enterprise: Benefits and Inhibitors by Cisco Systems, Inc.

June 2010 - (Free Research)
This white paper reveals the primary considerations for social networking, such as: business value and strategic relevance, adoption trends and concerns, and strategic considerations for ESS deployment. 
(WHITE PAPER)

Server Monitoring: Centralize and Win by TNT Software, Inc.

August 2009 - (Free Research)
One of the main limitations of native tools in a Windows OS is that it stores all of the event & performance logs information locally in each individual system. For an environment with multiple systems, this makes problem analysis much more challenging. This paper will discuss the importance of effective, centralized management solutions. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

NSS Labs:  2013 Next Generation Firewall Security Value Map by Fortinet, Inc.

March 2014 - (Free Research)
This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs. 
(WHITE PAPER) READ ABSTRACT |

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Automated Log Analytics Critical For Security and Compliance Management by VMware, Inc.

June 2013 - (Free Research)
Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

Integrated Solutions for Defect and Project Tracking by TechExcel

June 2008 - (Free Research)
This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market. 
(WHITE PAPER) READ ABSTRACT |

Security Vs. Flexibility: Must IT Management Choose? by Faronics

August 2008 - (Free Research)
This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed. 
(WHITE PAPER) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Detect and Survive by Guidance Software, Inc.

April 2010 - (Free Research)
This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software. 
(WHITE PAPER) READ ABSTRACT |

Postgres Plus 8.4 vs. MySQL 5.5: Feature Comparison and Commentary by EnterpriseDB Corporation

September 2010 - (Free Research)
This paper compares Postgres Plus Standard Server and Postgres Plus Advanced Server 8.4 against MySQL 5.5. The comparison is broken down into a number of sections with a short commentary following each section. Read on to learn how the Postgres Plus 8.4 stacks up against MySQL 5.5 on all the above topics and learn which one comes out on top. 
(WHITE PAPER) READ ABSTRACT |

Tablets & Smartphones in the Enterprise by SearchSecurity.com

January 2013 - (Free Research)
Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend. 
(EGUIDE) READ ABSTRACT |

Enterprise level security, the Huddle way. by Huddle

December 2011 - (Free Research)
This paper will give you an overview of Huddle's secure infrastructure and policies. 
(WHITE PAPER) READ ABSTRACT |

Improve Your Mobile Application Security by IBM

October 2012 - (Free Research)
Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself. 
(WHITE PAPER) READ ABSTRACT |

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats by IBM

January 2013 - (Free Research)
This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 451 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts