Risk Management Research
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
-
Adapting to the new web security and email security threats
Sponsored by: Cisco Systems, Inc.In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
Sponsored by: Neustar®This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
-
New data management tool will protect your nonproduction environments
Sponsored by: InformaticaAccess this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
10 Essential Elements for a Secure Enterprise Mobility Strategy
Sponsored by: CitrixThis resource guides you through the top 10 considerations when developing a mobile strategy.
-
Case Study - Anittel Simplifies Managed AV Service
Sponsored by: OpenText Security SolutionsThis informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
-
Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals
Sponsored by: TigerText, Inc.This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Phishing and Web Security
Sponsored by: OpenText Security SolutionsThis brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
-
Common Use of Mobile Devices Makes Strong Case for Strong BYOD
Sponsored by: TigerText, Inc.Access this expert e-guide from SearchHealthIT.com to learn more about the benefits and challenges to consider before implementing BYOD policies.
-
Healthcare Mobile Device Support Means Security Management
Sponsored by: TigerText, Inc.This expert e-guide from SearchHealthIT.com highlights two leading HCOs successful experiences with implementing secure BYOD programs. Click through to unveil 8 mobile device security tactics and policies to help you achieve similar results.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Providence Health & Services is Reacting to Threats Five Times Faster
Sponsored by: Symantec CorporationThis case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
-
Simplify implementation of the HITRUST Common Security Framework
Sponsored by: Symantec CorporationClick through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
-
Industry Perspectives: The Impact of HIPAA and HITECH
Sponsored by: Symantec CorporationThis white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
-
Expert Outlook on Cloud GRC
Sponsored by: TechTarget SecurityCloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
Avoid HIPAA Compliance Violations Amid the Rise of BYOD
Sponsored by: ImprivataThis expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Policy Based Encryption: Protecting your Business Against Email Risks
Sponsored by: ApptixThis white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
-
Data Privacy: Where Should I House My Data?
Sponsored by: IntraLinks, IncThis white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
-
Cisco 2014 Annual Security Report
Sponsored by: Cisco Systems, Inc.This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.