systems security

Results 276 - 300 of 328Sort Results By: Published Date | Title | Company Name

Remote Computer Repair with Intel® Core™ vPro™

Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage
    
Intel

Implementing PCI Compliance with ScriptLogic

Published By: Dell Software     Published Date: Jul 18, 2012
Implement PCI Compliance
Tags : 
pci, payment card industry, data security, scriptlogic, mocrosoft windows, it systems, data security, secure network
    
Dell Software

The Future Of Data Security And Privacy: Controlling Big Data

Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security
    
Forrester

Redefining Next Generation Security with Situational and Context Awareness

Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Combining Modern Authentication Needs with Identity and Access Management

Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Formulate A Database Security Strategy to Ensure Investments Prevent Breaches and Satisfy Regulation

Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications, java, application integration, configuration management, virtualization
    
Oracle

Blue Coat Systems 2012 Web Security Report

Published By: Blue Coat Systems     Published Date: Mar 23, 2012
By exploiting popular places on the Internet, such as search engines, social networking and email, malnets have become very adept at infecting many users with little added investment.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems

Implementing PCI Compliance with ScriptLogic

Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual
    
ScriptLogic

The TCO of FTP: Hidden Costs of "Free" File Sharing

Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.
Tags : 
seeburger, file sharing, erp systems, file storage, security, file transwer, tco, mft
    
SEEBURGER, Inc.

Access Control Integration White Paper

Published By: TDSi     Published Date: Jun 08, 2011
An Essential Guide to Integration of your Security Systems and the Benefits That Can Bring
Tags : 
access control integration, building management system, security management systems, integrated security management systems, integrated access control, intelligent building management system, bms systems, security management systems
    
TDSi

From AD to LDAP Through Virtualization

Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
    
Radiant Logic, Inc

Learn How Citrix Can Maximize Employee Productivity and Satisfaction

Published By: Citrix Systems     Published Date: Feb 23, 2011
Citrix solution brief explains the technical functionality of Citrix solutions that enable a successful BYO program.
Tags : 
citrix systems australia, byo program, employee productivity, windows desktop, bring your own computer, employee productivity, data security, mobile computing
    
Citrix Systems

How to Choose an Enterprise-Class Job Scheduling Solution Evaluation Guide

Published By: Cisco     Published Date: Dec 15, 2010
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization.
Tags : 
cisco, enterprise-class job scheduling, delivery, business processes, automation software, data center, systems management, backup and recovery
    
Cisco

Cloud-based IT management. Whatever you want, whenever you want, wherever you want.

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Now you can have easy SaaS-based Discovery and Reporting on all Physical and Virtual Systems, Security Update Status and Assets in Minutes.
Tags : 
shavlik, cloud-based it management, saas, discovery and reporting, virtual systems, security update, netchk protect, virtual infrastructure
    
Shavlik Technologies

Patch Management Best Practices

Published By: IBM Tivoli     Published Date: Dec 13, 2010
Application exploits are on the rise. And yet industry experts are reporting that most organizations are still not adequately keeping up with security patches for their operating systems, much less their applications. One of the most effective ways to protect against application exploits is to implement security patches within 48 hours of release across your entire organization. Sound impossible?
Tags : 
ibm, tivoli, application management, patch management, best practices, roi
    
IBM Tivoli

Guide to Malware and Attack Methods

Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security

The Centrify Suite enables you to extend Active Directory to your non-Microsoft platforms

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

PCI: Using Microsoft Active Directory to Address PCI Requirements in Heterogeneous Environments

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

Strengthen Security and Improve IT Efficiency by Replacing NIS with Active Directory

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

Technology Brief: Absolute Software Expands Lifecycle Management

Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software

Virtualization&Consolidation:Leveraging Dynamic Infrastructure for Cost Savings, Ease of Management

Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast will cover the best practices & benefits of virtualization & consolidation strategies.
Tags : 
virtualization and consolidation, mainline information systems, server, storage virtualization, tco, roi, security, servers
    
Mainline Information Systems

Webcast: Security convergence equals network security cost savings

Published By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : 
ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions, convergence, network management
    
IBM

ESC Boston 2009 Expo - largest community of designers, technologists, business leaders, and supplier

Published By: TechInsights     Published Date: Sep 01, 2009
Join us at ESC Boston, September 21-24 at the Hynes Convention Center, in Boston, MA. Expo registration is FREE, and advanced registration pricing is still available for conference packages.
Tags : 
embedded systems, conference, boston, esc boston, build your own embedded system, atom, windows embedded, classes
    
TechInsights

Optimizing Windows Server 2003

Published By: AppSense     Published Date: Aug 21, 2009
Explore how AppSense Management Suite enables Microsoft Windows 2003 systems to deliver improved overall system security, simplified management and increased capacity and performance.
Tags : 
windows server, windows server 2003, network management, appsense, server optimization, platforms
    
AppSense
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.