Security Policies Research
-
6 Ways to Enhance Security in AWS
Sponsored by: SafeNet, Inc.In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
-
Can a Federated Identity Service Strengthen SSO?
Sponsored by: Radiant Logic, Inc.With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
-
15 Point Checklist Cloud Data Protection
Sponsored by: SkyHighThis resource offers 5 exclusive tips for protecting business data across all cloud services.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
How to Create the Most Effective Compliance Program at Your Organization
Sponsored by: IntraLinks, IncIn this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
-
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
Sponsored by: ClearswiftIn this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
-
Top 10 Ways to Assess The Risk of Data Loss
Sponsored by: InfrascaleThis white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
-
Best Practices for Security and Compliance with Amazon Web Services
Sponsored by: Trend MicroThis resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
-
Maintaining Continuous Compliance: A New Best-Practice Approach
Sponsored by: IBMThis resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
-
Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
Sponsored by: IBMThis white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
-
Preventing Dangerous File-Sharing
Sponsored by: GlobalscapeThis resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
-
10 Essentials for Secure EMM
Sponsored by: CitrixThis resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
-
Transferring Data without Secure Protocols?
Sponsored by: GlobalscapeThis white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
-
Adapting to the new web security and email security threats
Sponsored by: Cisco Systems, Inc.In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
-
10 Essential Elements for a Secure Enterprise Mobility Strategy
Sponsored by: CitrixThis resource guides you through the top 10 considerations when developing a mobile strategy.
-
Common Use of Mobile Devices Makes Strong Case for Strong BYOD
Sponsored by: TigerText, Inc.Access this expert e-guide from SearchHealthIT.com to learn more about the benefits and challenges to consider before implementing BYOD policies.
-
Healthcare Mobile Device Support Means Security Management
Sponsored by: TigerText, Inc.This expert e-guide from SearchHealthIT.com highlights two leading HCOs successful experiences with implementing secure BYOD programs. Click through to unveil 8 mobile device security tactics and policies to help you achieve similar results.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Simplify implementation of the HITRUST Common Security Framework
Sponsored by: Symantec CorporationClick through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
HIPAA Compliance in a BYOD Environment
Sponsored by: ImprivataAccess this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.