Data Security Research
-
Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success
Sponsored by: Dell and VMwareRead this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.
-
Practical Steps to Achieve and Maintain NERC Compliance
Sponsored by: Tripwire, Inc.This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.
-
Managing Your Data Assets
Sponsored by: Pitney Bowes Business InsightInformation management is integral to successfully maintaining a competitive advantage. The value of all your data can increase or decrease over time depending on how you manage it. Read on to learn how to gain the insights into information management you need to succeed and gain that competitive edge that is now more important than ever.
-
Entitlement Reviews: A Practitioner's Guide
Sponsored by: VaronisThis document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.
-
Fixing the "Everyone" Problem
Sponsored by: VaronisRead this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
-
Protecting SharePoint Data Long Term
Sponsored by: VaronisThis paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
-
Symantec Protection Suite Challenge
Sponsored by: Symantec CorporationCheck out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
-
Technology & Business from Sun and AMD
Sponsored by: Sun Microsystems, Inc.Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...
-
Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
Sponsored by: Shavlik TechnologiesThis Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
-
eBook-- Defining an Email-Archiving Policy
Sponsored by: Symantec CorporationRead this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
-
Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
Sponsored by: Dell SoftwareThis webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
-
Presentation Transcript: Endpoint security fundamentals
Sponsored by: SophosThis presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
-
The Massachusetts Data Protection Law
Sponsored by: TechTarget SecurityMassachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
-
Symantec Protection Suite Enterprise Edition
Sponsored by: Symantec CorporationSymantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
-
5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
Sponsored by: Symantec CorporationPreventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
VMware Solutions for Small and Midsize Businesses: The Most Cost-Effective Way to Enable Always On IT
Sponsored by: Dell and VMwareCheck out this solution brief to discover how VMware equips SMBs with technology solutions that allow them to cost effectively optimize the use of their existing IT assets and resources as well as protect the systems, data, and applications that run the business, ensuring Always On IT.
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Presentation Transcript: Changing the Economics of Storage Infrastructure with Virtualization
Sponsored by: LSI and presented by HPIn these hard economic times, so much information is already out there about how to bring down the costs of storage infrastructures, but none of them describe how the design of a flexible and agile (adaptive) infrastructure actually facilitates these potential savings.
-
The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
Sponsored by: IronKeyCheck out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
-
Integrating Virtualized Servers with VMware vStorage-Enabled Dell EqualLogic iSCSI SANs
Sponsored by: Dell and VMwareDell EqualLogic Auto- Snapshot Manager / VMware Edition enables administrators to quickly and easily create hypervisor-aware snapshots of VMs-helping simplify data management, enhance scalability of data protection and recovery, and increase application performance.
-
Magic Quadrant for Endpoint Protection Platforms
Sponsored by: SophosGartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
-
eBook: A Holistic Approach to Data Protection
Sponsored by: TechTarget CIOIn this eBook the SearchCIO.com team discusses how Data Protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.