Search Results | Security management
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...365 NEXT
Sort by:  Most Relevant  |  Date
Juniper Networks launches Network and Security Manager (NSM)

Blog  Juniper Networks is expanding its network and security management capabilities across routing, switching and security infrastructure with the launch of the Network and Security Manager (NSM). The new Network and Security Manager (NSM) offers centralized management for Juniper Networks J-series servi...

Last updated: Aug 12, 2008   6:56 AM GMT  |  Blog: Network technologies and trends
Did you see this? - Microsoft updates Security Compliance Management Accelerator toolkit

Blog  In 2008, I blogged about Microsoft's release of Security Compliance Management Accelerator toolkit. Now two years later Microsoft announces an updated Security Compliance Manager. The Microsoft Security Compliance Manager is the next evolution of the Microsoft Security Compliance Management Toolkit ...

Last updated: Aug 27, 2010   5:49 PM GMT  |  Blog: IT Trenches
Cisco Security Manager 4.0 eases Network Administrators tasks

Blog   Cisco Systems introduced its 4.0 version of Cisco Security Manager (CSM). Cisco Security Manager (CSM) is an enterprise-class security management application which provides insight into and control of Cisco security and network devices including Cisco ASA 5500 Series Adaptive Security Appliances...

Last updated: Aug 31, 2010   10:40 AM GMT  |  Blog: Network technologies and trends
eBook excerpt: Assuring Information Security Part XI

Blog  Roles and responsibilities assignment for providing adequate IAP is typically considered critical to effective and efficient IT security. However, depending on the entity, IAP management roles and responsibilities may focus solely on IT security or IT and business security. Roles and responsibil...

Last updated: Jan 17, 2013   0:01 AM GMT  |  Blog: IT Governance, Risk, and Compliance
Forefront Security for OCS Management Pack for System Center Operations Manager 2007

Blog  For organizations that rely on Microsoft unified communications, Forefront Security seems like a natural fit. With components to protect and secure Exchange, SharePoint, and Office Communications Server, as well as client endpoints, Forefront Security provides comprehensive protection for a Microsof...

Last updated: Oct 19, 2009   2:45 AM GMT  |  Blog: Unified Communications: Click to talk
Top MSAM KB Articles

Blog   CTX-102849 CDAPad Users Guide CTX-101855 MetaFrame Nfuse Elite to Secure Access Manager Upgrade Guide CTX-101867 Customizing the Logon Agent CTX-103098 Force domains with the Logon Agent in Metaframe Secure Access Manager CTX-103098 Force domains with the Logon Agen...

Last updated: Apr 28, 2010   2:13 PM GMT  |  Blog: RTFM Education – Virtualization, VMware, Citrix
What is F5 BIG-IP Application Security Manager?

Blog  F5 BIG-IP Application Security Manager (ASM) is a Web Application Firewall (WAF) designed to secure Web Applications in virtual software-defined data center (SDDC), managed cloud service environment, public cloud, or traditional data center. F5 BIG-IP Application Security Manager (ASM) empowers Orga...

Last updated: May 4, 2015   4:35 AM GMT  |  Blog: Network technologies and trends   |      Data Center, F5, Public Cloud
The Center for Internet Security defines security metrics

Blog  As an information security manager I am always struggling with how to measure the security posture of my organization. As they say, you can't manage what you can't measure. There's lots of talk out there about ROI (Return on Investment) or ROSI (Return on Security Investment). These may be business ...

Last updated: May 22, 2009   3:24 PM GMT  |  Blog: IT Trenches
supply chain security

Blog  Supply chain security is the part of supply chain management (SCM) that focuses on minimizing risk for supply chain, logistics and transportation management systems (TMS). Continued Quote of the Day "Poor internal security procedures and a lack of compliance protocols -- especially for small sup...

Last updated: Aug 6, 2019   7:50 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Critical Incident Response Elements - Part I

Blog  Information technology is completely secure when resources are utilized and accessed as intended under all circumstances. Through delegation, every entity manager assumes responsibility for maintaining an adequate control system that safeguards assets. However, information security managers are typi...

Last updated: Jul 23, 2009   4:53 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Trend Micro launches SaaS security platform

Blog  Another security vendor is getting into the Software-as-a-Service (SaaS) business. Trend Micro has released SecureCloud, a platform that offers messaging gateway security, hosted email security and botnet identification services. And the Cupertino, Calif.-based company is aiming SecureCloud at its ...

Last updated: Jul 31, 2007   2:28 PM GMT  |  Blog: Channel Marker
vulnerability management

Blog  Vulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design could compromise the security of an endpoint or network. Continued Quote of the Day "Organizations tackle the most severe vulnerabilities first and work their wa...

Last updated: Mar 9, 2017   3:02 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      vulnerabilities, vulnerability management
Let's get real about information security

Blog   Wherever you go, or whatever you read, these days, it;s hard to escape security professionals and pundits that preach that information security and risk management are business enablers. Now that's certainly true. But we have to put this in perspective. Such benefits help support the business case ...

Last updated: Nov 9, 2008   6:49 AM GMT  |  Blog: David Laceys IT Security Blog   |      economics, perception, Professionalism
Juniper Networks announces new UAC

Blog  Network infrastructure vendors can help differentiate themselves in the security market with tight integration of their network and security products. Managing my firewalls, intrusion detection/prevention, network access control (NAC), etc., together with my routers and switches is an inducement to ...

Last updated: Aug 4, 2008   2:46 PM GMT  |  Blog: Security Bytes
Using Resource Manager in Oracle Fusion HCM Security

Answer  Hello. I need to use Resource Manager (manager hierarchy) to secure a person security profile in Oracle Fusion HCM. Resources on this topic are scarce. Has anyone used Resource Manager to build a custom person security profile? If so, did you have to use a custom SQL statement? Thanks!

Last updated: Dec 8, 2014   7:51 PM GMT   |    HCM, Oracle Fusion, SQL statements
SIEM Is Only a subset of MSSP For Enterprise Security

Blog  Security Incident and Event Management (SIEM) doesnt denote a complete spectrum of enterprise security. It is just a subset of Managed Security Services. In fact, looking at the increasing number of threats and vulnerabilities, enterprises are seriously looking for a suitable Managed Security Ser...

Last updated: Nov 9, 2018   4:38 PM GMT  |  Blog: Quality Assurance and Project Management   |      Enterprise Security
22 Information Security Projects For An Organization

Blog  Information security is the utmost priority for any business these days. While there are a number of projects that a CIO/CTO/CISO can initiate in his organization, few are important to keep on top of the agenda. These projects are not a one-time activity. These are of continuous nature. They basical...

Last updated: May 25, 2018   3:41 PM GMT  |  Blog: Quality Assurance and Project Management   |      Artificial intelligence, Data Loss Prevention, DLP
Measuring Delivery Value - Part I

Blog  Considering adamant demands for continuous process improvements, focus on overall information protection and delivery value in terms of enabled services has become a managerial necessity. Information Security Service Management is a set of processes enabling and potentially optimizing IT security se...

Last updated: Apr 17, 2009   5:56 PM GMT  |  Blog: IT Governance, Risk, and Compliance
IBM announces new cloud security services

Blog  IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. IBM announced this week new professional and technology security services aimed at organizations' cloud computing efforts. The announcements follow the results of...

Last updated: Oct 21, 2010   1:37 PM GMT  |  Blog: Security Bytes
Critical Incident Response Elements - Part IV

Blog  Managing an appropriate security incident response is typically a crucial business requirement. To enable effective management, a security MIS should correlate data to intended usage to determine security failure repercussions. Considering the primary contingency management objective is providing ...

Last updated: Aug 3, 2009   6:16 PM GMT  |  Blog: IT Governance, Risk, and Compliance
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...365 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: