Vendor Security Breach ConversionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Vendor Security Breach Conversions returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Application Security
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Endpoint Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Treasury / Cash / Risk Management

Related Searches
 •   Batch Vendor
 •   Definition Vendor
 •   Design Vendor Security
 •   Desktop Vendor Security Breach
 •   Form Vendor
 •   New Vendor Security
 •   Secure Vendor
 •   Vendor Article
 •   Vendor Security Graph
 •   Vendor Security Requirement
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Patch Tuesday Alerts by Lumension

July 2008 - (Free Research)
Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible. 
(PRESS RELEASE) READ ABSTRACT |

Presentation Transcript: Best Practices for Scheduled Security Update Cycle by GFI Software

May 2011 - (Free Research)
In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud by IBM

August 2010 - (Free Research)
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more. 
(TECHNICAL ARTICLE)

Complex Managed Hosting: Market Survey and Vendor Feature Comparison by Connectria Hosting

August 2010 - (Free Research)
In its most sophisticated form, complex managed hosting, companies can outsource high-level IT functions such as OS management, virtualization, load balancing, performance monitoring, security and more. Read this market survey to get a comparison of the different features offered by complex managed hosting companies. 
(WHITE PAPER) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

Cloud Storage Options for Primary or Nearline Data by IBM

December 2012 - (Free Research)
This expert E-Guide explores why early concerns over cloud storage are fading as offerings become increasingly sophisticated. Read now to learn more. 
(EGUIDE) READ ABSTRACT |

Virtual Data Center: Health Care IT Edition, Sept. 2011 by SearchHealthIT.com

September 2011 - (Free Research)
Cloud computing holds a lot of promise for the healthcare industry, since infrastructure costs can hinder the adoption of EHR systems. However, many providers shy away from cloud services because of security concerns. Inside this e-zine, gain insight on how to utilize the cloud while still ensuring patient data security and HIPAA compliance. 
(EZINE)

Key Steps to Securing Your Organization and Evicting a Hacker by Foundstone, Inc.

May 2008 - (Free Research)
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks. 
(PODCAST) READ ABSTRACT |

2013 Magic Quadrant for SIEM by IBM

May 2013 - (Free Research)
This Gartner Magic Quadrant highlights the top 16 SIEM vendors in the market today, and why many are offering threat intelligence and security analytics with their services. 
(ANALYST REPORT) READ ABSTRACT |

The Value of Integrated Security by Cisco Systems, Inc.

November 2008 - (Free Research)
Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Presentation Transcript: Pragmatic Data Security by Websense, Inc.

March 2010 - (Free Research)
This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The CIO’s Guide to HIPAA Compliant Text Messaging by Imprivata

December 2013 - (Free Research)
This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips to Keep Your Small Business Safe by Trend Micro, Inc.

November 2010 - (Free Research)
Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security Technology by Symantec Corporation

November 2013 - (Free Research)
Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being. 
(EGUIDE) READ ABSTRACT |

10 Must Haves for Secure Enterprise Mobility by Citrix

May 2013 - (Free Research)
In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies. 
(WHITE PAPER) READ ABSTRACT |

HP Simply StoreIT Solutions ChalkTalk - Backup and Data Protection by Hewlett-Packard Company

August 2013 - (Free Research)
Check out this short video to explore one industry-leading vendor's backup and data protection solutions. Whether you're just starting out, building momentum or expanding your business, these storage solutions for backup and data protection can help you. Watch now to learn more. 
(VIDEO) READ ABSTRACT |

The Great Software Mind Meld: How “The Cloud” Is Helping Vendors Peer Inside the Heads of Prospective Buyers by Runaware

June 2011 - (Free Research)
The difference between intriguing software and best-selling software is customer insight from feedback. Read this white paper to learn about a cloud-based analytics solution that for the first time allows software vendors to cull actionable intelligence from reliable, untainted customer feedback. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance Report: Cost Analysis Reveals Expense Justified by McAfee, Inc. [DO NOT USE]

December 2007 - (Free Research)
Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment. 
(WHITE PAPER) READ ABSTRACT |

Closing the data privacy gap for SAP Applications by IBM

October 2008 - (Free Research)
This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

May 2013 - (Free Research)
This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs. 
(ANALYST REPORT) READ ABSTRACT |

August Technical Guide on Authentication by SearchSecurity.com

August 2012 - (Free Research)
This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business. 
(WHITE PAPER) READ ABSTRACT |

Breach Detection Systems (BDS) Security Value MapTM by Fortinet, Inc.

April 2014 - (Free Research)
This one-page infographic takes a look at the correlation between value and protection for some of the top breach detection systems in the marketplace. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts