Data Security Research
-
Shouldn't Single Sign-on Be Child's Play?
Sponsored by: Microsoft & Quest SoftwareCheck out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
-
Two Sides of the Same Coin: The Convergence of Security and Compliance
Sponsored by: Imperva.Security and compliance issue will continue to dominate IT initiations as long as valuable on customer, employees, patients and business financials is exchanged and stored.
-
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Sponsored by: Juniper Networks, Inc.Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
-
The Modern Security Threat and Regulatory Compliance
Sponsored by: Bytware, Inc.SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
-
5 Steps toward Disaster Preparedness
Sponsored by: Cisco Systems, Inc.For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. This paper explains five key steps to consider when implementing a program for your company.
-
PCI DSS Success: Archiving Compliance and Increasing Web Application Security
Sponsored by: CitrixThis paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
-
Optimizing Storage with Global File Virtualization
Sponsored by: EMC CorporationGlobal file virtualization is changing network storage management. Learn about a solution that allows organizations to easily simplify management, increase utilization, resolve performance bottlenecks, leverage tiered storage and lower TCO.
-
Dell PowerVault MD3000
Sponsored by: DellEMC and IntelĀ®PowerVault MD3000 is a modular disk storage array capable of housing up to 15 3.5-inch SAS or SATA disk drives in a single 3U rack enclosure. Review this document to see all the great features the PowerVault MD3000 has to offer.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
Cisco ASA 5500 Series Adaptive Security Appliance
Sponsored by: Cisco Systems, Inc.In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
-
Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker
Sponsored by: i365, makers of EvaultIn this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.
-
The IBM Rational AppScan Lifecycle Solution
Sponsored by: IBMIBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Data Integration Improves Productivity
Sponsored by: AutodeskWith AutoCAD Map 3Dsoftware and AutoCAD® Raster Design, York Region delivers detailed maps with integrated data from multiple departments.
-
Oracle Database Vault
Sponsored by: Oracle CorporationOracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
-
IDC Report "Backup and Recovery: The Open Source Option Comes of Age"
Sponsored by: Zmanda Inc.Read the IDC Vendor Spotlight on Zmanda. Learn the latest user requirements, market trends and the unique role of Zmanda in bringing enterprise-scale open source backup & recovery solution to the market.
-
An EMC Perspective on Data De-Duplication for Backup
Sponsored by: EMC CorporationThis paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature of an organization's backup strategy.
-
Virtualization in Education
Sponsored by: IBM Line of BusinessThis white paper discusses how virtualization technology can help connect educators and students to applications and information from almost any device.
-
2008 Verizon Business Data Breach Investigations Report
Sponsored by: Verizon BusinessCheck out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
-
Staying ahead of the Curve: Oracle Database 11g Vs. Microsoft SQL Server 2005
Sponsored by: Oracle CorporationThe document shows that Microsoft has been slow to adapt to changing, real-world information needs and that SQL Server 2005 lacks some critical capabilities that are needed to both adapt to, and prepare for changes related to security.
-
Integrated Solutions for Defect and Project Tracking
Sponsored by: TechExcelThis paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
-
The 2008 (ISC)2 Global Information Security Workforce Study
Sponsored by: ISC2Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
-
Wholesale Grocer uses CONNX for Data Access, Data Integration and to Enhance Reporting Capabilities
Sponsored by: CONNX SolutionsExplore how a data access and integration solution saved one of North America's oldest wholesale grocers from replacing its ten year old distribution system and spending up to five million dollars on a brand new enterprise solution.
-
Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
Sponsored by: CitrixEnsuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
-
Key Steps to Securing Your Organization and Evicting a Hacker
Sponsored by: Foundstone, Inc.This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.