Infrastructure security

Results: 6100



#Item
551Computer network security / Crime prevention / National security / Public safety / Auditing / DMZ / Information security / Statement on Auditing Standards No. 70: Service Organizations / Data center / Security / Computing / Computer security

Send Word Now Security and Technology Overview Send Word Now’s goal is to provide a completely secure, flexible, scalable, and reliable system that customers can trust. Our infrastructure is based on a strong foundatio

Add to Reading List

Source URL: www.sendwordnow.com

Language: English - Date: 2011-01-27 15:29:18
552Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud communications / IBM cloud computing / Cloud computing / Computing / Centralized computing

G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:49:47
553Cryptography / Packaging / Tamper resistance / National Security Agency / Two-factor authentication / EMC Symmetrix / Check Point / Security / Computer security / Computing

PRODUCT BRIEF CryptoManager™ Infrastructure Secure Foundation for Connected Devices Connected products, including mobile phones and Internet of Things (IoT) devices have a critical need for security. Robust security s

Add to Reading List

Source URL: www.rambus.com

Language: English - Date: 2014-06-13 13:31:23
554Electric power transmission systems / Electric power distribution / Emerging technologies / Smart grid / Smart meter / Smart city / Electrical grid / Data center / Framework Programmes for Research and Technological Development / Energy / Electric power / Technology

FINSENY Vision, Mission and Strategy FINSENY Vision « A sustainable Smart Energy system in Europe, combining critical infrastructure reliability and security with adaptive intelligence, enabled by open Future Internet T

Add to Reading List

Source URL: www.fi-ppp-finseny.eu

Language: English - Date: 2012-05-04 05:34:51
555Content-control software / Fortinet / Hyper-V / Virtual machine / VM / System software / Software / Computer network security

FortiManager TM Centralized Security Management Take Control of Your Security Infrastructure

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
556Software / Fortinet / Application firewall / Virtual private network / Virtual appliance / Network security / Viaedge / Check Point / Computer network security / System software / Computing

FortiGate Virtual Appliances ® Consolidated Security for Virtual Environments FortiGate virtual appliances allow you to mitigate blind spots by implementing critical security controls within your virtual infrastructure.

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:07
557Cloud infrastructure / Cloud storage / Data center / Computer security / IBM cloud computing / IICCRD / Cloud computing / Computing / Centralized computing

G-Cloud Linux-asa-Service Secure Management of a Linux Server platform The trusted way to deploy your Linux Servers Built on Sentinel by SCC’s Infrastructure-as-a-Service, our Linux service provides pre-accredited and

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:51:07
558Cloud infrastructure / Hadoop / Apache Hadoop / Parallel computing / Emerging technologies / MapR / Big data / Data Intensive Computing / Computing / Cloud computing / Concurrent computing

Hadoop Data Access on Your Terms™ BlueTalon Solution Brief Are Data Access and Security Issues Slowing Your Adoption of Hadoop?

Add to Reading List

Source URL: bluetalon.com

Language: English - Date: 2015-06-08 21:23:04
559Streaming / Computer network security / Network architecture / Electronic engineering / Deep packet inspection / Policy charging and rules function / Traffic shaping / Quality of service / Traffic flow / Computing / Telecommunications engineering / Network performance

Application Note Intel® Architecture Processors Qosmos* DPI Technology Policy Enforcement in SDN and NFV- based Telco Infrastructure

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:29
560Cryptographic protocols / Electronic commerce / X.509 / Transport Layer Security / ID-based cryptography / ID-based encryption / Public key infrastructure / Grid Security Infrastructure / Digital signature / Cryptography / Key management / Public-key cryptography

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-30 07:23:50
UPDATE