Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security / Security Administration

You are using the plain HTML view, switch to advanced view for a more complete experience.

Mitigating Risks with Security Intelligence and Identity Assurance
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Westar Energy Protects the Power Grid with IBM Security
Westar Energy leverages IBM's Identity and Access Management suite to not only protect the systems from internal and external access but also demonstrate compliance.
Image Encryption Research based on Key Extracted from Iris Feature
The encryption algorithm has disadvantages like the long key making memory difficult and uneasy safekeeping, which causes a potential threat to the information security. Therefore,...
Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm
To meet the demand of digitizing progress of pharmaceutical retail industry, there are various kinds of software are made for pharmaceutical retail enterprise. However, much commer...
Dreaming of a more secure and hybrid MBaaS future
The future of MBaaS is going to be more hybrid and secure to meet the security requirements of customers across regulated industries.
Dreaming of a more secure and hybrid MBaaS future
The future of MBaaS is going to be more hybrid and secure to meet the security requirements of customers across regulated industries.
Symantec: Internet Security Threat Report 2015 (Dutch)
This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longe...
Always On SSL - Symantec Guide (Portuguese)
Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving co...
Symantec: Internet Security Threat Report 2015 (Spanish)
This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longe...
Symantec: Internet Security Threat Report 2015 (Italian)
This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longe...
Post Selected Items to:

Showing 10 items of 58

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2015 NewsKnowledge