Security Policies Research
-
Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
Sponsored by: OpenTextIn this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
-
Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection
Sponsored by: Hewlett-Packard EnterpriseThis exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
Proactive data security, audit and compliance solutions
Sponsored by: IBMAccess this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
-
Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
Sponsored by: IBMThis informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.
-
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
Sponsored by: LumensionIn this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
-
Three Ways to Prevent USB Insecurity
Sponsored by: LumensionThis crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
CORE Security and the Payment Card Industry Data Security Standard
Sponsored by: Core Security TechnologiesThis informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Enterprise Security Checklist
Sponsored by: Code42This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
-
Building An Intelligence - Driven Security Operations Center
Sponsored by: EMC CorporationAccess this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
-
Crafting a Secure Approach to Mobility and Compliance
Sponsored by: TechTarget Mobile ComputingThis expert resource discusses key security features that need to be addressed when creating an effective mobile strategy, including how you can ensure compliance. Read on and learn about crucial topics such as encryption, data protection, and mobile application management.
-
Gamania Group tightens security to strengthen game development capability
Sponsored by: Hewlett Packard EnterpriseInside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
-
Mapping Security for your Virtual Environment
Sponsored by: Hewlett Packard EnterpriseAccess this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
-
The Personalisation Challenge: Business Culture and Mobile Security
Sponsored by: Hewlett Packard EnterpriseThis exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
-
BYOD Security Strategies: Balancing BYOD Risks and Rewards
Sponsored by: TechTarget SecurityThis expert guide takes an in-depth look at BYOD security strategies, outlining what crucial factors you need to keep in mind and how you can ensure a successful and secure BYOD initiative.
-
Keep Cloud Compliant
Sponsored by: TechTarget SecurityAccess this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
-
The Mobile Trust Gap
Sponsored by: MobileIronThis important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
-
Okta Active Directory Integration - An Architecture Overview
Sponsored by: OktaThis white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
-
TechGuide: Endpoint Security Management
Sponsored by: TechTarget SecurityThis expert e-guide will help you sort through your endpoint security management troubles by redefining and transitioning your strategy to fit the growing requirement for defending against malware.
-
Simplify and Consolidate Data Protection for Better Business Results
Sponsored by: IBMThis informative resource examines a tool that provides advanced visualization, built-in analytics and integrated workflow automation features that dramatically simplify backup administration to streamline problem resolution and simplify data protection.
-
EssentialEnterprise Mobile Device Security Controls and Policies
Sponsored by: TechTarget SecurityIn this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk.