Enterprise control

Results: 1542



#Item
111

CHI 2008 Proceedings · Policy, Telemedicine, and Enterprise April 5-10, 2008 · Florence, Italy A User Study of Policy Creation in a Flexible Access-Control System

Add to Reading List

Source URL: vaniea.com

Language: English - Date: 2012-01-24 12:46:12
    112

    INFORMATION RISK MANAGEMENT TECHNICAL SOLUTIONS Assessing residual risk within the enterprise has a critical dependency on pinpointing the technical control gaps that exist. Breadth of Technology Coverage + Offers wide e

    Add to Reading List

    Source URL: www.versprite.com

    Language: English - Date: 2014-04-06 16:07:52
      113Security / Prevention / Computing / Computer network security / Mobile device management / Windows Server / USB flash drive / Password / Security token / Computer security / Server

      SPYRUS Enterprise Management System (SEMS) Secure Control of Portable USB Devices Secure Control of SPYRUS USB Devices security gate has been compromised.

      Add to Reading List

      Source URL: www.spyrus.com

      Language: English - Date: 2015-08-05 12:25:55
      114

      CloudBolt Software Transforms Enterprise IT -- ROCKVILLE, Md., Sept. 20, 2012 /PRNewswire/ -- CloudBolt Software Transforms Enterprise IT Next-Gen IT Management Tool Delivers Unified Command and Control Platform

      Add to Reading List

      Source URL: dl.cloudbolt.io

      Language: English - Date: 2013-06-27 13:35:55
        115

        OpenSDWN: Programmatic Control over Home and Enterprise WiFi Julius Schulz-Zander Carlos Mayer

        Add to Reading List

        Source URL: www.net.t-labs.tu-berlin.de

        Language: English - Date: 2015-05-21 07:05:31
          116

          From camera to the control room, trust DVTEL to be your end-to-end video surveillance solution provider. VIDEO MANAGEMENT SYSTEMS Entry-level to Enterprise. DVTEL delivers.

          Add to Reading List

          Source URL: www.dvtel.com

          Language: English - Date: 2014-12-11 09:59:33
            117Access control / National Security Agency / Multilevel security / Mandatory access control / Role-based access control / Common Criteria / Security-Enhanced Linux / Labeled Security Protection Profile / Evaluation Assurance Level / Computer security / Security / Evaluation

            Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

            Add to Reading List

            Source URL: www.niap-ccevs.org

            Language: English - Date: 2009-10-08 10:40:04
            118Environment of California / Enterprise modelling / CALFED Bay-Delta Program / California State Water Project / DWR / Systems modeling / California State Water Resources Control Board / Government of California / California / Water in California

            AsilomarBay-Delta Modeling Forum & Interagency Ecological Program Workshop

            Add to Reading List

            Source URL: www.cwemf.org

            Language: English - Date: 2003-07-01 12:55:08
            119Procurement / EMarketPlace / Information technology management / Purchase order / Enterprise resource planning / Value added tax / Business / Supply chain management / Electronic commerce

            DATASHEET Procserve eMarketplace: drive compliance. reduce errors. gain control. Procserve eMarketplace is leading the way in putting our customers in total

            Add to Reading List

            Source URL: www.procserve.com

            Language: English - Date: 2015-03-26 18:45:58
            120Ethics / Auditing / Security / Risk management / Committee of Sponsoring Organizations of the Treadway Commission / Enterprise risk management / Operational risk / Internal control / Basel II / Risk / Management / Actuarial science

            Why COSO is flawed COSO not only fails to help a firm assess its risks, it actually obfuscates the risk assessment process. By Ali Samad-Khan

            Add to Reading List

            Source URL: www.opriskadvisory.com

            Language: English - Date: 2005-01-18 23:07:11
            UPDATE