Infrastructure security

Results: 6100



#Item
611Software / Fortinet / Application firewall / Virtual private network / Virtual appliance / Network security / Viaedge / Check Point / Computer network security / System software / Computing

FortiGate Virtual Appliances ® Consolidated Security for Virtual Environments FortiGate virtual appliances allow you to mitigate blind spots by implementing critical security controls within your virtual infrastructure.

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:07
612Identity / Federated identity / Data security / Computer security / Identity management / Data protection / Information privacy / Privacy

Advancing a Versatile Interoperable Identity Infrastructure for Finance and Banking in the EU

Add to Reading List

Source URL: identityeconomics.com

Language: English - Date: 2007-10-13 22:16:36
613Content-control software / Fortinet / Hyper-V / Virtual machine / VM / System software / Software / Computer network security

FortiManager TM Centralized Security Management Take Control of Your Security Infrastructure

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:07
614Public safety / Data security / Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / Information security / Mission assurance / National security / Security / Computer security

D E PA R T M E N T O F T H E N AV Y O F F I C E O F T H E S E C R E TA R YN AV Y P E N TAG O N WA S H I N G TO N D C 0 SECNAVINST

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-19 17:53:16
615Data security / Blackboard Inc. / Distance education / Educational technology / Online education / Backup / Data center / Converged storage / University of North Carolina at Greensboro / Computing / Cloud computing / Concurrent computing

ITS Technology Infrastructure PlanThe following framework describes the technology infrastructure plan of the University of North Carolina at Greensboro (UNCG). As such, it is a continuously evolving document a

Add to Reading List

Source URL: its.uncg.edu

Language: English
616Development / Infrastructure / Emergency management / Social vulnerability / Alaska / Permafrost / National security / Critical infrastructure protection / Climate Change Science Program / Physical geography / Geography / Construction

A System to Reduce the Impacts of Climate Change on Alaska’s Public Infrastructure

Add to Reading List

Source URL: climatechange.alaska.gov

Language: English - Date: 2013-05-20 13:07:14
617Outsourcing / Service-level agreement / Cloud infrastructure / IICCRD / Cloud computing security / Cloud computing / Centralized computing / Computing

AC Dublin - EU Guidelines on Cloud Computing Service Agreements, December 2014.indd

Add to Reading List

Source URL: www.arthurcox.com

Language: English - Date: 2014-12-23 06:14:21
618Law / Government / Statutory law / Broadcast Decency Enforcement Act / National Information Infrastructure Protection Act / Internal Revenue Code / Employee Retirement Income Security Act / United States Code

SAMr. WYDEN (for himself and Mr. Hatch) submitted an amendment intended to be proposed by him to the bill H.R. 5021, to provide an extension of Federal-aid highway, highway safety, motor carrier safety, transit, a

Add to Reading List

Source URL: www.americanbenefitscouncil.org

Language: English - Date: 2014-07-30 14:52:59
619Computing / OpenDNS / Fast flux / Border Gateway Protocol / Domain name / Domain name system / Internet / Network architecture

OpenDNS Investigate Datasheet Investigate Attacks Like Never Before Attackers are pivoting through your infrastructure. What if you could pivot through theirs? Many security products provide visibility into what’s hap

Add to Reading List

Source URL: info.opendns.com

Language: English - Date: 2015-05-23 02:56:09
620AlgoSec / Infrastructure optimization / Managed security service / Service-level agreement / Computing / Information technology / Technology / Computer network security / Information technology management / Outsourcing

The AlgoSec Suite for Managed Security Service Providers Firewall and network security management are among the most complex, labor-intensive offerings that MSSPs deliver. MSSPs seeking a competitive advantage are turnin

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-07-07 06:08:02
UPDATE