RecruitingBlogscom

Follow Us:

 

security technology

Results 401 - 425 of 440Sort Results By: Published Date | Title | Company Name
Published By: CA ITAM     Published Date: Sep 09, 2008
Robin Bloor addresses the business value to be derived by evaluating key client management processes such as asset management, service management, change management, security and integration/automation against four maturity levels. Read this white paper to learn how to align your people, processes and technology to elevate the maturity of your client management.
Tags : 
    
CA ITAM
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations, event management solution, enterprise applications
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will look at aligning security processes, the human element of security, with the latest security technologies - creating a secure barrier against today's most insidious threats.
Tags : 
messagelabs symantec hosted services, best practices, security process, security technology, threats, anti-virus
    
Symantec.cloud
Published By: Focus     Published Date: Jul 29, 2010
Cut through the confusion surrounding network technologies and implementation. Download our free SMB Networking Buyer's Guide today.
Tags : 
3com, at&t, backup, belkin, buffalo, ca arcserve, charter, cisco, citrix, client security, comcast, cox, coyote point systems, d-link systems, dell, earthlink, enterasys, f5 networks, fluke networks, ibm
    
Focus
Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology, business technology
    
SAS
Published By: CSC     Published Date: Oct 18, 2010
The CSC Security Stack white paper lifts the fog of complexity with regards to the cybersecurity challenges businesses and governments face.
Tags : 
cybersecurity, security, information technology
    
CSC
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
    
Red Hat
Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows, attacks, apple, linux, mobile, operating systems, solutions, endpoint, protection
    
ESET
Published By: Idera     Published Date: Jun 21, 2011
SharePoint 2007 was big, and SharePoint 2010 shows every sign of being even bigger. However, there is one stumbling block on the way to SharePoint 2010 nirvana... upgrading. In this white paper, find out ten of the common difficulties you may encounter when upgrading content to SharePoint 2010 and some solutions.
Tags : 
idera, sharepoint, migration, upgrade, monitor, customization, metadata, populating, third party, exchange, nerd, security audit, back up and recovery, architect, public folders, hosting, cloud, protection, technology
    
Idera
Published By: Symantec     Published Date: Oct 02, 2012
The Shortcut Guide to Business Security Measures Using SSL
Tags : 
realtime, symantec, ssl, security measures, technology, business technology
    
Symantec
Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: Courion     Published Date: Sep 29, 2012
This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.
Tags : 
courion, identity management, access management, security, it security, technology, automation
    
Courion
Published By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : 
mobile security, corporate intranet, blackberry, secure connectivity, business technology
    
BlackBerry
Published By: McAfee     Published Date: Sep 17, 2013
How Cybercriminals Make Money With Your Email, An Osterman Research Whitepaper
Tags : 
email protection, security, mcafee, solution, technology, research, cyberprotection, business technology
    
McAfee
Published By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : 
netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud, private cloud, hybrid cloud, cloud security, cloud, data security, it security, cloud service, cloud technology, cloud solution, security management, security
    
NETIQ
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization
    
Cisco
Published By: Windstream     Published Date: Mar 19, 2015
The following report will help you gain advantage through proactive use of network security.
Tags : 
windstream communications, network security, risk management, internet security, business technology
    
Windstream
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top