Video Security Assessment StatementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Video Security Assessment Statement returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Managed Security Services
 •   Vulnerability Assessment
 •   Application Security
 •   Security Monitoring
 •   Endpoint Security
 •   Virtualization
 •   Storage Security

Related Searches
 •   Configurations Video
 •   Designer Video
 •   Manual Video Security
 •   Measures Video Security
 •   Screen Video Security Assessment
 •   Video Event
 •   Video Security Assessment Forms
 •   Video Security Assessment Managers
 •   Video Security Firm
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Media Conversion in Video Security and Surveillance Systems by Transition Networks, Inc.

September 2008 - (Free Research)
This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Guide to Deploying and Troubleshooting Video in the Enterprise by Fluke Networks

December 2010 - (Free Research)
Recently, a study commissioned by Cisco® Systems made a prediction that added a new word to the lexicon of the network engineer and IT director: zetabyte. The study predicted that by 2013, two-thirds of a zetabyte of video traffic would be on corporate networks. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Collaboration Services: Decision Criteria and 10 Questions to Ask Your Potential Collaboration Vendors by SearchSecurity.com

April 2013 - (Free Research)
This expert E-Guide from SearchUnifiedCommunications.com details the ten questions you should ask any potential collaboration vendor and offers a five-step process that will help you pick out the best products to create your collaboration architecture. 
(EGUIDE) READ ABSTRACT |

Visual Collaboration's Changing and Critical Role in the Modern Enterprise by Cisco Systems, Inc.

July 2013 - (Free Research)
This exclusive resource examines how your organization can continually increase the business value of video collaboration, from expanding your telepresence outside the boardroom to effective management tools for IT. 
(WHITE PAPER) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

August 2009 - (Free Research)
The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

SearchStorageUK Essential Guide to Backup by SearchStorage.co.UK

May 2012 - (Free Research)
Check out this expert E-Guide to discover the current state of backup, and learn about today's newest available data protection, virtualization and backup technologies. 
(EGUIDE) READ ABSTRACT |

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Cisco 2014 Annual Security Report by Cisco Systems, Inc.

April 2014 - (Free Research)
This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime. 
(WHITE PAPER) READ ABSTRACT |

Cisco Web Security Appliance by Cisco Systems, Inc.

April 2014 - (Free Research)
This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic. 
(WHITE PAPER) READ ABSTRACT |

Cisco Email Security by Cisco Systems, Inc.

April 2014 - (Free Research)
This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them. 
(WHITE PAPER) READ ABSTRACT |

Cisco Cloud Web Security: Single Interface for Global Control by Cisco Systems, Inc.

February 2014 - (Free Research)
This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks. 
(WHITE PAPER) READ ABSTRACT |

Advanced Malware Protection for your Web and Email Gateways by Cisco Systems, Inc.

February 2014 - (Free Research)
This article explores the recent merger between one company's advanced malware protection and their web and email gateways. 
(PRESS RELEASE) READ ABSTRACT |

Web Security – Virtual Appliance by Cisco Systems, Inc.

April 2014 - (Free Research)
Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes. 
(WEBCAST) READ ABSTRACT |

Mitigating Email Virus Attacks by Cisco Systems, Inc.

April 2014 - (Free Research)
This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure. 
(WHITE PAPER) READ ABSTRACT |

Cloud Web Security Using Cisco ASA by Cisco Systems, Inc.

April 2014 - (Free Research)
This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy. 
(WHITE PAPER) READ ABSTRACT |

Mobility, Virtualization and the Next-Generation Workplace by Cisco Systems, Inc.

June 2012 - (Free Research)
By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions. 
(WHITE PAPER) READ ABSTRACT |

This Month in the Threat Webscape for October 2009 by Websense, Inc.

November 2009 - (Free Research)
The Websense Security Labs Threatscape delivers information about breaking security research topics and today's advanced Internet threats. This Month's 'In the Threatscape' is a review of October's Web threat activity. Watch the video to learn more. 
(VIDEO) READ ABSTRACT |

Compliant Statement Archiving and Presentment for Financial Services by EMC Corporation

September 2008 - (Free Research)
Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements. 
(WHITE PAPER) READ ABSTRACT |

Future-Proofing the Core, the Distribution Layer, and the Wiring Closet of Enterprise Networks by D-Link

June 2010 - (Free Research)
With so much riding on the availability and performance of the network, businesses of all sizes need a reliable infrastructure that eliminates downtime and is highly efficient, and flexible to handle the challenges of ever-increasing bandwidth. Read this paper to learn what you should look for in a solution and how to choose the proper vendor. 
(WHITE PAPER) READ ABSTRACT |

Web Security: Advanced Malware Protection by Cisco Systems, Inc.

April 2014 - (Free Research)
This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention. 
(WHITE PAPER) READ ABSTRACT |

Video - Vulnerability Management in a Web 2.0 World by Lumension

January 2009 - (Free Research)
Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats. 
(VIDEOCAST) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts