Search Results | Security management
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...375 NEXT
Sort by:  Most Relevant  |  Date
Ten ways to sell security to management

Discussion  Here's ten tips for Windows security managers who need coworkers and managers to buy into their new information security initiatives.

Last updated: Nov 24, 2013   8:10 PM GMT   |    Security, Windows Security
Rackspace launches compliance assistance and managed security services

Discussion  Following its shift to a managed cloud services model, Rackspace has moved into the managed security and compliance services space.

Last updated: Oct 2, 2015   8:17 PM GMT   |    Compliance, Rackspace, Security
IT in Europe, Security Edition: Smartphone security issues

Discussion  How can security teams manage devices they dont control? Find out how to manage smartphone and tablet security threats.

Last updated: Oct 26, 2016   7:49 PM GMT   |    Security, Smartphones, Tablets
Security and Risk Management Program Maturity Assessment

Discussion  Good security and risk management requires a wide range of ingredients: Mature business continuity management, compliance, identity and access management, information security management, privacy, and risk management practices. This guide addresses why program maturity assessments are essential to k...

Last updated: Apr 1, 2014   4:56 PM GMT   |    Risk management, Security
Pervasive protection is the new security paradigm

Discussion  Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.

Last updated: Jul 29, 2014   3:29 PM GMT   |    Pervasive, Risk management, Security
Symantec acquires Altiris, prepares new edition of network access control app

Discussion  Symantec is bolstering its endpoint security and management products by releasing a more flexible version of its NAC product and buying a developer of systems-management apps.

Last updated: Sep 30, 2013   2:55 PM GMT   |    Altiris, NAC, Security
Third-party security products to the rescue, part 2

Discussion  When it comes to security, Exchange managers can use some assistance. Part 2 of 2 parts.

Last updated: Dec 11, 2013   3:47 AM GMT   |    Microsoft Exchange, Security
Security SaaS helps financial portal stop server attacks

Discussion  Startup Dome9 provides cloud-based firewall management service for public and private cloud servers.

Last updated: Nov 25, 2013   3:03 AM GMT   |    Private Cloud, Public Cloud, SaaS
Aveksa acquisition expands RSA's intelligence-driven security strategy

Discussion  Aveksa acquisition should help RSA compete in burgeoning identity management market.

Last updated: May 1, 2014   4:25 PM GMT   |    Identity management, RSA, Security
Business intelligence required for national security and civil liberties

Discussion  Knowledge management and business intelligence are key to achieving national security while preserving basic civil liberties.

Last updated: Feb 20, 2014   8:35 PM GMT   |    Business Intelligence, Security
need an outsourced managed security vendor

Answer  Looking at a managed security service provider that can help with GLBA regulatory requirements

Last updated: Nov 28, 2005   2:49 PM GMT   |    backdoors, Career Development, Compliance
Selling security: Get management to help fix software vulnerabilities

Discussion  Kevin Beaver discusses why effective communication with management is the key to securing software vulnerabilities.

Last updated: Feb 18, 2014   4:59 PM GMT   |    Security, Software vulnerabilities
Using UTM to lower costs, reduce latency and improve security rollouts

Discussion  Unified threat management appliances are critical for improving future security rollouts, reducing costs and minimizing latency.

Last updated: Jun 2, 2014   1:00 PM GMT   |    Security, UTM
Are Relational Database Management Systems secure?

Answer  Are Relational Database Management Systems secure? What are the major security threats?

Last updated: Sep 25, 2014   7:00 AM GMT   |    Database, RDBMS, Security
NHS trust denies bullying and intimidation of IT whistleblower

Discussion  Managers were already aware of whistleblower's concerns about the accuracy of NHS Southwark's data, tribunal hears

Last updated: Sep 15, 2015   8:57 AM GMT   |    Security, Whistleblower
RSA announces Managed Security Partner programme

Discussion  RSA has announced a programme designed to enable a new generation of managed security services

Last updated: Dec 9, 2015   8:54 PM GMT   |    RSA, Security
Best security programs for organizations

Answer  What's the best security program or system out there (with management) for organizations / companies?

Last updated: May 9, 2017   1:13 PM GMT   |    Security
Are you familiar with identity management systems?

Answer  As BYOD becomes more prevalent, some companies have turned to identity management systems to safeguard data and employees. Are you aware of identity management systems? Has your company adopted such software tools?

Last updated: Feb 21, 2013   8:08 PM GMT   |    BYOD, Identity management, Security
Are you familiar with identity management systems?

Discussion  As BYOD becomes more prevalent, some companies have turned to identity management systems to safeguard data and employees. Are you aware of identity management systems? Has your company adopted such software tools?

Last updated: Dec 31, 2013   2:57 PM GMT   |    BYOD, Identity management, Security
How to define an acceptable level of risk

Discussion  Even though management is responsible for defining an organization's acceptable level of risk, the security practitioner should understand the process and be able to illustrate to management how underlining security threats can negatively affect business objectives.

Last updated: Dec 12, 2013   3:00 AM GMT   |    Risk assessment, Security
Creating a security risk management plan format

Discussion  Enterprises without a codified risk management plan are much more susceptible to threats. In this expert response from Ernie Hayden, learn how to create a risk management plan that covers all the bases.

Last updated: Mar 25, 2014   3:34 PM GMT   |    Risk management, Security
Operations Navigator - Management Central

Answer  I am unable to connect to Management Central system. We are on V5R1M0, the TCP/IP connectivity is fine, job log for "qypsjsvr" show - CPFB9A1 Management central connection failed. Please help

Last updated: Jan 15, 2005   2:10 AM GMT   |    DataCenter, Development, Hardware
Managing SQL 2000 server over the internet

Answer  I have an SQL 2000 server behind a firewall. I have set the ports to be forward to this server. I would like to manage this server from home using enterprise manager. How can I accomplish this.

Last updated: Jan 18, 2007   12:20 AM GMT   |    Access, DataCenter, Desktops
The needle and thread of patch management

Discussion  When it comes to security and patch management, there's no substitute for planning and analysis. Get advice from industry experts on how to make patch management a little less painful.

Last updated: Feb 1, 2014   1:19 AM GMT   |    Patch management, Security
Board security awareness & education

Answer  Should corporate boards be required to have representation from the information security domain? Is it a governance issue that security and IT risk management has become critical, yet director's ability to manage this domain has perhaps lagged?

Last updated: Jan 5, 2015   7:38 PM GMT   |    corporate governance, Risk management, Security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...375 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: