Information Security Research
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
IT Security. Fighting the Silent Threat
Sponsored by: KasperskyKaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
-
Gamania Group tightens security to strengthen game development capability
Sponsored by: Hewlett Packard EnterpriseInside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
-
Mapping Security for your Virtual Environment
Sponsored by: Hewlett Packard EnterpriseAccess this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
-
High Performance, High Capacity 2048/4096-bit SSL Offload
Sponsored by: A10 NetworksThis informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
-
The Personalisation Challenge: Business Culture and Mobile Security
Sponsored by: Hewlett Packard EnterpriseThis exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
-
Keep Cloud Compliant
Sponsored by: TechTarget SecurityAccess this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
-
Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
Sponsored by: OpenText Security SolutionsThis expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
-
Webcast: The Newest Information Management Innovation from IBM
Sponsored by: IBMThis valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
-
Webcast: IBM Information Management in the New Era of Computing
Sponsored by: IBMDepending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
-
Hitting the Information Governance and Compliance Sweet Spot
Sponsored by: IBMIn this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
-
Tackling the Data Security Challenge
Sponsored by: IBMIn this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
-
Information Governance for Business Value
Sponsored by: IBMIn this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
-
Setting the Stage for the Data Governance: A CIO's Guide
Sponsored by: IBMIn this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
-
Enterprise Information Protection - The Impact of Big Data
Sponsored by: IBMIn this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
-
Stopping Privilege Creep: Limiting User Privileges with Access Reviews
Sponsored by: TechTarget SecurityThis SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
-
Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
-
Modern Retention Enablement
Sponsored by: IBMThis quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
-
IT Reputational Risk Study Overview
Sponsored by: IBMThis short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
-
Information Security Threats: Building Risk Resilience
Sponsored by: TechTarget SecurityEnterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
-
Computer Weekly – 2 July 2013: Business value from the internet of things
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we hear from manufacturing giant GE about its plan for gaining business value from the "internet of things", analysing huge amounts of machine data in an industrial internet. Our latest buyer's guide looks at HR management systems. And we look at ways to improve the detection of data breaches. Read the issue now.
-
What you didn’t know about Certificate-Based Authentication
Sponsored by: OpenTrustYou may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
-
How to add Mobile Devices to Enterprise PKI solutions
Sponsored by: OpenTrustExtending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
-
Sharing Security Intelligence: How to Build a Strong Network
Sponsored by: Hexis Cyber Solutions IncThis expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.