Trusted Network Connect

Results: 26



#Item
11Security / Information technology management / Software asset management / Trusted Network Connect / Network Access Control / Trusted Computing / Vulnerability / ISO/IEC 19770 / Computer security / Computer network security / Cyberwarfare

BUILDING BLOCK SOFTWARE ASSET MANAGEMENT Continuous Monitoring

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-19 14:23:27
12Computing / Cyberwarfare / Security / Automation / Malware / Security event manager / Trusted Network Connect / Security information and event management / IF-MAP / Computer security / Computer network security / Trusted computing

Emerging Topics Engineering Session Emerging Topics  CEE

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:55
13Cyberwarfare / Network Access Control / Trusted Network Connect / Windows XP / Trusted Computing / IF-MAP / Network security / Computer network security / Computer security / Computing

Network Security Automation Standards: TNC and SCAP Copyright © 2011 Trusted Computing Group Trusted Network Connect

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:04
14Cyberwarfare / Trusted Network Connect / IEEE 802.1X / Network Access Control / RADIUS / Extensible Authentication Protocol / Juniper Networks / Trusted Computing Group / Wireless access point / Computer network security / Computer security / Computing

White Paper The Importance of Standards to Network Access Control Juniper Networks, Inc.

Add to Reading List

Source URL: www.opus1.com

Language: English - Date: 2008-04-28 05:03:54
15Cyberwarfare / Trusted Network Connect / IF-MAP / Trusted Computing Group / Lumeta Corporation / Network security / Security Content Automation Protocol / Computer security / Computer network security / Trusted computing

Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright © 2010 Trusted Computing Group

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
16Computing / Trusted Network Connect / IF-MAP / Trusted Platform Module / Network Access Control / Trusted system / Virtual private network / Network security / Operating system / Computer security / Computer network security / Trusted computing

TNC: Open Standards for Network Security Automation Copyright © 2010 Trusted Computing Group

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
17Trusted Network Connect / IF-MAP / Security Content Automation Protocol / TNC / Computer security / Computer network security / Trusted computing

SCAP Exchanges in Trusted Network Connect IT Security Automation Conference 2012 Charles Schmidt © 2012 The MITRE Corporation. All rights reserved.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:05
18Mitre Corporation / Open Vulnerability and Assessment Language / Trusted Network Connect / Mitre / Security Content Automation Protocol / Computer security / Clothing / Christianity

Change in Operational Model for OVAL Over the past two years, the security automation leadership within the US Government (DHS, NIST, and NSA) has been developing a long-term strategy for security automation that focuse

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2014-05-14 17:18:06
19Open Vulnerability and Assessment Language / Vulnerability / Trusted Network Connect / National Institute of Standards and Technology / Asset / Security Content Automation Protocol / Computer security / Cyberwarfare / Extensible Configuration Checklist Description Format

Security Automation Developer Days March 22-25, 2011 Portrait Room The National Institute for Standards and Technology Gaithersburg, MD

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:01
20Design / Visual arts / Communication / Advertising / Communication design / Graphic design

Network with business leaders, elected officials and key staff at the 33rd Annual Fountain Valley Chamber of Commerce Legislative Reception as we lead, advocate and connect as the Trusted Voice of Business.

Add to Reading List

Source URL: origin.library.constantcontact.com

Language: English
UPDATE