ca security

Results 3151 - 3175 of 3431Sort Results By: Published Date | Title | Company Name
Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, hackers, security, data protection
    
McAfee Inc
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : 
acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, trial download, software trial, free trial
    
Acronis Inc.
Published By: Acronis Inc.     Published Date: Jul 14, 2009
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.
Tags : 
acronis, backup, recovery, server, windows, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, windows server, free trial, demo software, bare metal, virtual backup, data deduplication
    
Acronis Inc.
Published By: IBM     Published Date: Jul 10, 2009
Online social networking is expanding exponentially and making a huge impact on the enterprise. IBM offers cutting-edge technologies and tools to help you develop and deliver Web 2.0 applications that are simple to build, quick to remix and easy to extend.
Tags : 
ibm, web 2.0, ibm jazz, web application, mashup, rational appscan, security application, collaboration, knowledge management
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: CrownPeak     Published Date: Jun 30, 2009
Congratulations you've decided to embark on the journey to implement a content management system (CMS) for your Web site. This document assumes that you have already built the business case for purchasing a CMS and has been signed off on by the appropriate stakeholders. Learn more today!
Tags : 
crownpeak, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management, enterprise integration, enterprise application
    
CrownPeak
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: IBM     Published Date: Jun 24, 2009
This white paper outlines the advantages of WebSphere Portal for System z software and provides essential information to those considering adding Web-facing workloads on their mainframe hardware. Also, with these WebSphere Portal for System z options, IBM illustrates its ongoing commitment to mainframe computing and underscores the business value that remains inherent in the System z platform. Learn more today!
Tags : 
enterprise, web 2.0, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa, service oriented architecture, hfs, hierarchical file system, ibm db2, cics, zap, application assist processor, linux
    
IBM
Published By: IBM     Published Date: Jun 24, 2009
WebSphere Portal remains IBM's strategic front end for SOA. It enables our clients to closely align their business objectives on standards-based platforms with role-based delivery of composite applications across and beyond their enterprise. At the end of June we delivered a new version of WebSphere Portal Version 6.1. This release significantly improves performance by tapping into the 64-bit capabilities of the IBM System z platform. Click here to learn more!
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: IBM     Published Date: Jun 24, 2009
Improving access to core applications and data is just one of many mandates facing IT, along with improving collaboration, reducing administration costs and improving performance. Fortunately, shops running System z have an advantage. You can integrate and enhance your System z assets faster when you use the version 6.1 update to IBM WebSphere Portal on z/OS. Use it to quickly deploy business applications across the enterprise, reduce costs and increase flexibility with workloads centralized on System z.
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how you can simplify compliance and automate the transition from development to production with complete traceability.  Benefit from process definition and enforcement, and automatic generation of audit trails.  Add consolidation to single, global repository where you move code into a single software change and configuration management instance that works globally, but performs as if everything were local.  Result: savings and productivity.
Tags : 
serena, compliance, traceability, enforment, software, single software, alm, collaboration, efficiency, productivity, enterprise, application lifecycle management, gartner, mission critical, sox, hippa, cmmi, audit, enforcement, security
    
SERENA Software, Inc
Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management, report on compliance, roc, vulnerabilities, threat, solutions, compliance, secure, cardholder, encryption, hospitality, retail, transportation
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Are untested Web applications putting your business at risk?
Tags : 
ibm, rational appscan, web application security, risk, threat, compliance, scan, fix, reporting, functionality, mmdg, web application security consortium, wasc, javascript and xml, ajax, sox, hiipa, quality assurance, security
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Previously known as Watchfire AppScan, Rational® AppScan® Standard Edition V7.8 is a leading testing tool that scans and tests your Web applications for all common vulnerabilities. Download the trial to see how it automates the testing process so you can address problems early.
Tags : 
trial, appscan, watchfire, rational appscan, ibm, mmdg, testing, web application, web application security, risk, threat, compliance, scan, fix, reporting, functionality, mmdg, web application security consortium, wasc, javascript and xml
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : 
identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
    
IBM
Published By: Intuit, Inc     Published Date: Jun 16, 2009
Nearly every business person regardless of their role – be it marketer, salesperson, consultant, engineer, or business owner – has acquired a second responsibility: project manager. In their desire to move quickly and keep costs low, many of these business people turn to the ubiquitous spreadsheet for help. Using a spreadsheet to track, update, and consolidate project information means spending valuable time on project administration – sending, receiving, and finding e-mails; cutting, pasting, consolidating, and reporting information; and reformatting, saving, and e-mailing spreadsheets.
Tags : 
intuit, quickbase, project management, available, familiar, inexpensive, immediate, spreadsheets, certification, data management, data consolidation, data, workflow, multi-user access, scalable, data integrity, document management, security, audit, compliance
    
Intuit, Inc
Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption
    
LockLizard
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Jelly Bean increased ROI and conversions by implementing McAfee SECURE™ service and building trust with their visitors. Download today!
Tags : 
jelly belly, mcafee, secure, service, roi, conversions, trustmark, website security, certification
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how certifying a web site to the McAfee Data Security Standard improved online conversions for Littman Brothers. Download today!
Tags : 
littman brothers, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ID Card Group increased sales and conversions with McAfee SECURE ™ service. Download today!
Tags : 
b2b, retailer id, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales
    
McAfee, Inc.
Start   Previous    120 121 122 123 124 125 126 127 128 129 130 131 132 133 134    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.