Utility SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Utility Security returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Grid/ Utility Computing
 •   Data Security
 •   Security Policies
 •   Application Security
 •   Security Monitoring
 •   Virtualization
 •   Access Control
 •   Storage Security
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Accessing Utility Security
 •   Advanced Utility Security
 •   Creation Utility
 •   Reseller Utility Security
 •   Utility Security Assessment
 •   Utility Security Company
 •   Utility Security Events
 •   Utility Security Managers
 •   Utility Security Rfq
 •   Utility Security Schema
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Leverage Security Intelligence for Energy and Utilities Companies by IBM

July 31, 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing Security: Making Virtual Machines Cloud-Ready by Trend Micro, Inc.

October 20, 2010 - (Free Research)
This paper covers the delivery model of cloud computing that is also called utility computing, or Infrastructure as a Service (IaaS). It looks at the security implications and challenges that IaaS presents and offers best practices to service providers and enterprises hoping to leverage IaaS and so much more. 
(WHITE PAPER) READ ABSTRACT |

Transforming Insight Into Action With Business Event Processing by IBM

December 31, 2009 - (Free Research)
This white paper explores key business event processing capabilities that are helping energy and utilities organizations to manage instrumented and intelligent utility networks detect outages, improve grid security, and prevent fraudulent use of energy. 
(WHITE PAPER) READ ABSTRACT |

Is Utility Hosting Right For Your Business? by AT&T Corp

August 04, 2010 - (Free Research)
Compared to dedicated hosting, utility hosting is easily scalable and standardized as a turnkey package. Its chief advantage is that you pay only for the computing capacity that you use. A good time to adopt this solution is when change is taking place. 
(WHITE PAPER)

Lumension Vulnerability Scanner Offer by Lumension

March 11, 2009 - (Free Research)
This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes. 
(ASSESSMENT TOOL) READ ABSTRACT |

Free Software – Solve Common LAN problems with Switch Port Monitor Utility by Fluke Networks

October 12, 2010 - (Free Research)
For the majority of enterprises, the switch is the key network device, so visibility into the switch is necessary to thoroughly understand what’s actually happening on the network. Fluke Networks' free Switch Port Monitor software provides detailed information by port such as interface name, speed, status, packet activity and so much more. 
(DOWNLOAD) READ ABSTRACT |

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security by Faronics

January 07, 2010 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Using VMware Infrastructure 3 with 3PAR Utility Storage in Datacenter Deployments by 3PAR

October 01, 2006 - (Free Research)
This paper discusses the complementary benefits of combining features of VMware and 3PAR technologies to gain increased performance and avoid the cost of over-provisioning servers and storage in an IT infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Overcoming the Three Biggest PCI Challenges by Alert Logic

August 19, 2009 - (Free Research)
PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Role Based Access Control and Entitlement Management by FoxT

September 30, 2009 - (Free Research)
The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition by IBM

October 27, 2010 - (Free Research)
In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points. 
(WHITE PAPER) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

New Security Challenges for State and Local Governments by FireEye

December 31, 2013 - (Free Research)
This white paper explores the current threat landscape and why traditional tools fail to detect advanced attacks. 
(WHITE PAPER) READ ABSTRACT |

Identify And Influence Identity Stakeholders by Ping Identity Corporation

July 16, 2012 - (Free Research)
This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: Emerging Threats, Essential Strategies by Juniper Networks, Inc.

February 15, 2012 - (Free Research)
In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution. 
(WHITE PAPER) READ ABSTRACT |

How Application Whitelisting Can Increase Your Desktop Security by Faronics

November 19, 2009 - (Free Research)
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus. 
(WEBCAST) READ ABSTRACT |

Expert E-Book: Data Security and the Cloud by SearchSecurity.com

February 07, 2011 - (Free Research)
This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing. 
(EBOOK) READ ABSTRACT |

How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.

February 17, 2011 - (Free Research)
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data. 
(WHITE PAPER) READ ABSTRACT |

Security-In-Depth Using Integrated Risk-Conscious Controls by Tripwire, Inc.

November 09, 2011 - (Free Research)
Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach. 
(WHITE PAPER) READ ABSTRACT |

Comparing health care data security compliance to other industries by Hewlett-Packard Company

April 09, 2012 - (Free Research)
<p>This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.</p> 
(EGUIDE) READ ABSTRACT |

Protect Your Data like a Fortune 500 Company by SafeData, LLC

July 2008 - (Free Research)
This white paper explores the types of world-class data protection and business continuity solutions that are available for businesses and how the utility model makes them easy and affordable. 
(WHITE PAPER) READ ABSTRACT |

How to handle requirements for risk assessment methodologies by ComputerWeekly.com

November 2010 - (Free Research)
Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization. 
(WHITE PAPER) READ ABSTRACT |

Converged Storage: Utility Storage - The Ideal Platform for Virtual and Cloud Computing by HP and Intel

February 2012 - (Free Research)
In this IDG Tech Dossier, learn how utility storage makes for massive consolidation, flexibility and scalability, so IT departments can reduce storage infrastructure and lower costs while improving their ability to respond to fast-changing needs of business units. 
(WHITE PAPER) READ ABSTRACT |

Rectiphy ActiveImage Protector 2.7 by Rectiphy Corp.

October 2010 - (Free Research)
Rectiphy ActiveImage Protector™ is a hard disk backup / restore utility for Windows systems designed for corporate, small office/home office (SOHO) workstations, and home users. Read this informative white paper to learn more about how ActiveImage Protector can help you. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

March 2011 - (Free Research)
Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts