ca security

Results 3026 - 3050 of 3431Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security, security administration
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Learn how to you ensure that security standards are met as part of your quality measures.
Tags : 
ibm ouncelab, podcast, security software, secure software delivery, security
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.
Tags : 
ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security, recruitment & staffing, outsourcing & subcontracting, outsourcing, outsource, labor relations, it operations, human resources, human capital management
    
IBM Software
Published By: Focus     Published Date: Jul 29, 2010
Cut through the confusion surrounding network technologies and implementation. Download our free SMB Networking Buyer's Guide today.
Tags : 
3com, at&t, backup, belkin, buffalo, ca arcserve, charter, cisco, citrix, client security, comcast, cox, coyote point systems, d-link systems, dell, earthlink, enterasys, f5 networks, fluke networks, ibm
    
Focus
Published By: HP     Published Date: Jul 22, 2010
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks.
Tags : 
network security, dns, botnet command and control (cnc), malware; phishing, hp tippingpoint, tippingpoint digital vaccine, tippingpoint n-platform ips, tippingpoint security management, ips platform, access switches, reputation database, security management system
    
HP
Published By: SafeNet     Published Date: Jul 20, 2010
In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!
Tags : 
safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security
    
SafeNet
Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet
Published By: SafeNet     Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
Tags : 
safenet, enterprise security policy, key management, cryptography, data protection application, integrated security platform, encryption
    
SafeNet
Published By: Datacastle     Published Date: Jul 09, 2010
How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.
Tags : 
datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection, regulatory compliance
    
Datacastle
Published By: Datacastle     Published Date: Jul 09, 2010
Learn how massive storage economies can be achieved without sacrificing security, even in a multi-tenant environment.
Tags : 
datacastle, data deduplication, encrypted data, security, storage
    
Datacastle
Published By: Datacastle     Published Date: Jul 09, 2010
Learn how to protect laptop data from loss or theft, and save on storage and IT resources with this best practices guide.
Tags : 
datacastle, encrypting laptop data, storage, mobile workforce, data protection, security
    
Datacastle
Published By: Savvis     Published Date: Jul 07, 2010
Savvis Symphony Dedicated and Open offer enterprises a compelling opportunity to reshape their hosting environment to a more scalable and cost-efficient operating model without sacrificing security or performance.
Tags : 
savvis symphony dedicated, virtualization, cloud computing, infrastructure
    
Savvis
Published By: Mocana     Published Date: Jun 22, 2010
Mocana's NanoSSL is a comprehensive SSL solution designed for efficiency and high performance in embedded and resource-constrained environments. Download the NanoSSL whitepaper and receive a free trial.
Tags : 
mocana, nano ssl, device environment, tls, security services, certificate management, open source
    
Mocana
Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoVOIP is a comprehensive security solution for application developers and device designers looking to build secure VOIP products. Its simple API means no previous crypto expertise is required, and its tiny memory footprint goes where other implementations simply can't. Download the NanoVOIP whitepaper and receive a free trial.
Tags : 
mocana, nano voip, security, application developer, device designer, encrypted voice, video, data solution
    
Mocana
Published By: Mocana     Published Date: Jun 18, 2010
Learn how Mocana's NanoSec can speed your product development cycle while providing best-in-class device security for resource-constrained environments. Download the product whitepaper and receive a free trial.
Tags : 
mocana, nanosec, ipsec, embedded devices, product development cycle, device security
    
Mocana
Published By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : 
mocana, nano wireless security, wpa2, device developer, open source code
    
Mocana
Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoCrypto is one of the smallest, fastest, and most complete cryptography engines designed for embedded systems. Download the NanoCrypto whitepaper and receive a free trial.
Tags : 
mocana, nano crypto, embedded device, security authentication, cryptography engine
    
Mocana
Published By: IBM     Published Date: Jun 09, 2010
Learn the correct way to create a secure application with this free white paper from IBM.
Tags : 
secure application, source code, penetration test, ibm, it security
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Download this free IBM white paper to learn best practices for outsourcing application development.
Tags : 
application development, outsourced applications, ibm, it security
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : 
vulnerabilities, secure application, ibm, source code, software development, it security
    
IBM
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives. Contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Start   Previous    115 116 117 118 119 120 121 122 123 124 125 126 127 128 129    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.