Virus Classification Taxonomy Security OntologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Virus Classification Taxonomy Security Ontology returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Anti-Virus Solutions
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Security Policies
 •   Intrusion Prevention Solutions
 •   Endpoint Security
 •   Application Security
 •   Anti-Spyware

Related Searches
 •   Budget Virus Classification Taxonomy
 •   Computers Virus Classification
 •   Consults Virus Classification Taxonomy
 •   Industries Virus Classification
 •   Virus Capacity
 •   Virus Classification Contact
 •   Virus Classification Taxonomy Kentucky
 •   Virus Classification Taxonomy Specialist
 •   Virus New
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 31, 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Using Windows File Classification Infrastructure to Classify and Protect Documents by TITUS

November 11, 2010 - (Free Research)
This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 25, 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

How to tackle information classification by ComputerWeekly.com

November 09, 2010 - (Free Research)
The aim of this paper is to demonstrate how information classification can be used to enhance security within a Collaboration Oriented Architecture. 
(WHITE PAPER) READ ABSTRACT |

Achieving ISO 27001 Compliance using Titus Solutions by TITUS

November 11, 2010 - (Free Research)
This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents. 
(WHITE PAPER) READ ABSTRACT |

Information Classification: Delivering Security and Business Value by Boldon James

October 10, 2011 - (Free Research)
This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software. 
(WHITE PAPER) READ ABSTRACT |

Achieve Network Visibility and Control with Firewall Traffic Classification by Palo Alto Networks

March 21, 2014 - (Free Research)
In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies. 
(WHITE PAPER) READ ABSTRACT |

Using Classification to Manage Email Policy for the Enterprise by TITUS

May 2008 - (Free Research)
Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email. 
(WHITE PAPER) READ ABSTRACT |

Rapid Architectural Consolidation Engine - The Enterprise Solution for Disparate Data Models by Innovative Routines International, Inc.

March 2008 - (Free Research)
RapidACE is a software platform that enables data architects to integrate disparate data models automatically. It delivers high speed, automated data model consolidation. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-zine Volume 12: SharePoint Taxonomies That Stand the Test of Time by SearchWinIT

July 2009 - (Free Research)
In this month's issue, learn ways to accommodate permanent departments and business functions as well as ad hoc collaboration when building out your SharePoint taxonomies. 
(EZINE)

Mitigating DDoS Attacks with F5 Technology by F5 Networks

July 2013 - (Free Research)
This exclusive white paper examines a set of solutions that can securely deliver applications while protecting the network, the session and the user, with mitigation technologies that map directly to individual DDoS attacks. 
(WHITE PAPER) READ ABSTRACT |

Is It Time for Automated Classification? by OpenText

May 2014 - (Free Research)
This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Intellectual Property: It Starts with a Single Click by TITUS

August 2013 - (Free Research)
Download Aberdeen's latest report to discover how you can protect your intellectual property with a single click. 
(WHITE PAPER) READ ABSTRACT |

2010 Threat Report by Websense, Inc.

January 2011 - (Free Research)
Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats. 
(WHITE PAPER) READ ABSTRACT |

Predictions 2014: Identity and Access Management by IBM

November 2013 - (Free Research)
This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014. 
(ANALYST REPORT) READ ABSTRACT |

Implementing Highly Available Data Protection with Veritas NetBackup by Symantec Corporation

February 2008 - (Free Research)
This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site. 
(WHITE PAPER) READ ABSTRACT |

IT Handbook: Cloud Computing Security Up Close by Intel

July 2011 - (Free Research)
This IT handbook is designed to help organizations make practical and strategic decisions about their own cloud security. Follow these guidelines to make sure that you've established policies that define data classification categories, data labeling mechanisms and data handling requirements. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

SharePoint E-Zine Volume 11: Managing Documents By Content Type by SearchWinIT

June 2009 - (Free Research)
SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your... 
(EZINE)

Virtualization Management Survey Report: Key Findings by Focus

August 2009 - (Free Research)
This FOCUS report of key findings presents the highlights of an end-user survey conducted in April 2009, outlining the current state of virtualization adoption, pain points, barriers to expansion, and management requirements. 
(ANALYST REPORT) READ ABSTRACT |

WebSense Security Lab: Zero-Day in Critical Vulnerability by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

This Month in the Threat Webscape for July 2009 by Websense, Inc.

September 2009 - (Free Research)
In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. 
(VIDEO) READ ABSTRACT |

Presentation Transcript: The Real Deal About Windows Server 2008 R2, Part 2 - Best New Features for SMBs by Dell and Microsoft

May 2010 - (Free Research)
With the release of Windows Server 2008 R2, came a number of new features. Some of them offer more benefit to SMBs than others. In this presentation transcript, learn about the best new features of Windows Server 2008 R2 that will have the most impact on SMBs, including BranchCache, File Classification Infrastructure and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Web Security Gateway: Web 2.0 Secured and Simplified by Websense, Inc.

January 2011 - (Free Research)
The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts