Home
 > search for

Featured Documents related to »  research security


Aberdeen Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive!
This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better

research security  Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive! This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read. Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » research security


Aberdeen Research Brief: Web Security in the Cloud-More Secure! More Compliant! Less Expensive!
This paper compares on-premise versus software-as-a-service (SaaS) hosted solutions for Web security. Through the comparison, you can see that there is research

research security  Research Brief: Web Security in the Cloud-More Secure! More Compliant! Less Expensive! This paper compares on-premise versus software-as-a-service (SaaS) hosted solutions for Web security. Through the comparison, you can see that there is research that suggests that hosted services are a better choice for compliance, security, and costs. If you’re an IT manager who is undecided about the SaaS model, this is a must-read. Read More
IT Security


research security  Security Read More
Outsourcing Security Part 3: Selecting a Managed Security Services Provider
As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security

research security  ask about the MSSPs' research and development departments, and funding for these areas: How is the MSSP staff kept abreast of the latest security industry trends? Does it have a research organization dedicated to staying abreast of the latest cyber threats, vulnerabilities, hacker techniques, and security developments? Does it constantly monitor security alerts and advisories? What specialized knowledge and security expertise does the MSSP staff have? Conclusion When looking to hire an MSSP, companies Read More
Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk

research security  Risk Assessment and Management in Web Application Security Originally published January 27, 2006 Security risk assessment and security risk management have become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of Read More
Information Security Selection Software Evaluation Report
Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages

research security  Security Selection Software Evaluation Report Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions. Read More
Ventana Research
Ventana Research is a research and advisory services firm that provides guidance to help organizations manage and optimize performance.

research security  Research Ventana Research is a research and advisory services firm that provides guidance to help organizations manage and optimize performance. Read More
2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware
Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to

research security  Security Alliance | Security Research Analysis | Security Excellence | Secure Access | Internet Security Overview | Ironport Internet Security | Ironport Web Security | Ironport Security Self Evaluation Guide | Ironport Fix Security Vulnerabilities | Ironport Top Security Software | Ironport Internet Security Spyware | Ironport Download Free Security | Ironport Internet Security Software | Ironport Internet Account Files | Ironport Internet Security Information | Ironport Internet Security Definition | Read More
Nemertes Research
Nemertes Research is a research, advisory, and consulting firm founded in 2002. The firm specializes in analyzing the business value of technologies.

research security  Research Nemertes Research is a research, advisory, and consulting firm founded in 2002. The firm specializes in analyzing the business value of technologies. Read More
Security Snafu at NetBank
Online internet bank NetBank suffered an embarrassing security exposure late last week when a customer discovered he had access to more funds and information

research security  to do online banking, research their credentials first: Find out what Internet Service Provider (ISP) the bank uses. Look at the ISP's website and see how much attention they give to security. If they offer security consulting services, chances are they understand network security better than ISP's without such services which means they are more likely to better safeguard a bank's website. Any reputable ISP will be happy to answer questions over the phone. Ask them what kind of firewall they use and what Read More
HIPAA-Watch for Security Speeds Up Compliance Part One: Vendor and Product Information
HIPAA-Watch for Security is a tool designed to guide organizations through the risk analysis required by the Health Insurance Portability and Accountability Act

research security  Technologies, a leading security research and advisory firm, evaluated HIPAA-Watch for Security to verify how well it performed in guiding organizations through the HIPAA security risk analysis process. Vendor Background and Information RiskWatch was founded in 1993 in Landover, Maryland (US) with the idea of automating risk assessment modeling for the Department of Defense. Founder, Caroline Hamilton, a statistical modeling expert, put together a prototype for a risk analysis tool and then managed its Read More
New Market for Security Insurance
Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer

research security  Market for Security Insurance Event Summary In light of the heightened exposure various companies are facing regarding website, network, and system security compromises, insurance brokers are jumping on the bandwagon, offering customized Security Insurance Polices that protect companies with information technology infrastructures against numerous risks not covered by their required standard corporate General Liability Insurance Policy. Some of the kinds of protections these policies cover are: Loss due Read More
IT Security Guide: Unified Threat Management
While large enterprises have the resources to manage an overly complex series of inline devices and the requisite staff to perform all manner of security

research security  Security Guide: Unified Threat Management While large enterprises have the resources to manage an overly complex series of inline devices and the requisite staff to perform all manner of security functions, small to medium businesses (SMBs) cannot afford to deploy them all, even though they are subject to the same level of attacks. Unified threat management (UTM) is the gateway security solution that has evolved along with the rise of enterprise security threats. Read More
Forrester Research, Inc.
International research and advisory firm Forrester Research provides its clients consumer and business data, consulting, peer-to-peer executive programs, events

research security  Research, Inc. International research and advisory firm Forrester Research provides its clients consumer and business data, consulting, peer-to-peer executive programs, events, and online communities. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others