IT Management  >   Systems Operations  >   Security  >   AAA  >  

Carrier Access Codes

RSS Feed    Add to Google    Add to My Yahoo!
Carrier Access Codes Reports
 
Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Mobility in the Workplace: Balance Security and User Experience
sponsored by HID
EBOOK: This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

HID

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Why So Many Enterprises Lack Proper Authentication Methods
sponsored by RSA Softcat
EGUIDE: Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

Controlling Data Center Security
sponsored by Barracuda Networks
WHITE PAPER: Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier
sponsored by SearchCIO.com
EZINE: Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

SearchCIO.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement