Work Security Checklist Case StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Work Security Checklist Case Study returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Network Security
 •   Wireless Security
 •   Storage Management
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Managed Security Services
 •   Mobile Device Management
 •   Application Security

Related Searches
 •   Examples Work Security Checklist
 •   Form Work
 •   Suite Work Security Checklist
 •   Work Desktops
 •   Work Devices
 •   Work Issues
 •   Work Security Checklist Desktop
 •   Work Security Examples
 •   Work Security Learning
 •   Work Security Value
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Protecting and simplifying access to Electronic Health Records by DigitalPersona, Inc

June 21, 2011 - (Free Research)
Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Deploying the Best SIEM System Available by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Uncover the SIEM a security service provider uses to help them achieve real-time visibility and control over their systems and services to increase intelligence, protection, and safety. 
(CASE STUDY) READ ABSTRACT |

Case Study: Novagalicia Secures Critical Applications with HP Fortify by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Case Study: Protection and Replication for Remote Data Sources by Iron Mountain

May 16, 2011 - (Free Research)
Employees sometimes lose track of their laptops, either through misplacing them or through theft. One of the main concerns of IT was to protect vital business data on laptops, to prevent that data from falling into the wrong hands, and also to get the employee's system working again. Read this case study to learn one company's solution. 
(CASE STUDY) READ ABSTRACT |

PhoneFactor Case Study: Fredrikson & Byron, P.A. by PhoneFactor

April 11, 2013 - (Free Research)
Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information. 
(CASE STUDY) READ ABSTRACT |

Case Study: Reducing Backup and Recovery Costs by 80% by Iron Mountain

January 28, 2011 - (Free Research)
Read this Case Study to learn how the Eighteenth Judicial Circuit of Florida protected their data and prepared for unforeseen natural disasters. 
(CASE STUDY) READ ABSTRACT |

Beaufort Memorial Hospital Case Study by VMware, Inc.

July 16, 2013 - (Free Research)
This informative case study details how a healthcare facility used a desktop virtualization solution to reduce desktop provisioning time, cut login time in half and dramatically improve security and productivity. 
(CASE STUDY) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 02, 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

Panda Security and Delta Wines - Case Study by Panda Security

July 15, 2013 - (Free Research)
Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up. 
(CASE STUDY) READ ABSTRACT |

Buyer's Checklist: Cloud gateway appliances by SearchStorage.com

November 30, 2012 - (Free Research)
Cloud storage services often fit in best when used as a storage tier for nearline, archive or backup data. Cloud gateway appliances integrate easily and provide an easy on-ramp to cloud storage. In any of those scenarios, the essential element is a cloud gateway appliance that integrates on-site storage operations with cloud storage services. 
(EZINE) READ ABSTRACT |

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication by i365, makers of Evault

June 30, 2009 - (Free Research)
Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers. 
(CASE STUDY) READ ABSTRACT |

Network Security Checklist by Cisco Systems, Inc.

February 28, 2008 - (Free Research)
Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company. 
(WHITE PAPER) READ ABSTRACT |

Making the Case for BPM: A Benefits Checklist by IBM

December 15, 2010 - (Free Research)
BPM is the best investment a company can make in establishing a platform for continuous improvement. The challenge for many companies is justifying the BPM investment instead of traditional paths for solving process problems – like buying an application or building a custom application. This paper provides a virtual checklist for the benefits. 
(WHITE PAPER) READ ABSTRACT |

HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm by BlackBerry

September 16, 2011 - (Free Research)
Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security. 
(CASE STUDY) READ ABSTRACT |

Podcast--Connecting Through Content Issue One: How Technology Marketers Meet Buyers' Appetite For Content by KnowledgeStorm, Inc (E-mail this company)

May 2007 - (Free Research)
This report discusses content strategies and preferences from the unique perspectives of both the B2B technology buyers and marketers. 
(PODCAST) READ ABSTRACT |

Connecting Through Content: Issue One by KnowledgeStorm, Inc (E-mail this company)

March 2007 - (Free Research)
This report, Issue One: How Technology Marketers Meet Buyers' Appetite for Content is the first in the Connecting Through Content series, which explores content creation, distribution and lead nurturing through the dual marketers' and technology buyers' perspectives. 
(ANALYST REPORT) READ ABSTRACT |

SIEM IT Decision Center- Checklist #2 by SearchSecurity.com

February 2013 - (Free Research)
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward. 
(EGUIDE) READ ABSTRACT |

Case Study: Transitioning to Server Virtualization with Hyper-V and NetApp by NetApp and Microsoft

December 2008 - (Free Research)
Learn how one IT team transitioned to server virtualization with Microsoft® Hyper-V<sup>™</sup> coupled with NetApp storage to enable a variety of flexible disaster recovery and availability scenarios. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 17 April 2012: How to ensure smartphone security by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT. 
(EZINE) READ ABSTRACT |

Achieve business continuity and keep people productive with remote access by Citrix

January 2014 - (Free Research)
This whitepaper discusses an approach to business continuity that leverages multiple virtualization technologies to provide the flexible mobile and remote access needed to keep the workforce connected to the critical apps and data they depend on. 
(WHITE PAPER) READ ABSTRACT |

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World by Webroot

August 2013 - (Free Research)
This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more. 
(CASE STUDY) READ ABSTRACT |

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World by Webroot

May 2013 - (Free Research)
This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more. 
(CASE STUDY) READ ABSTRACT |

SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization by FireEye

March 2014 - (Free Research)
Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts