Data Security Research
-
A Guide to Evaluating Email Security Solutions
Sponsored by: SonicWALLE-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
-
Potomac Hospital Case Study
Sponsored by: SonicWALLIn this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
-
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
Sponsored by: SonicWALLSSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
-
LeftHand Networks Virtual SAN Appliance for VMware® ESX: Virtual Storage Platform
Sponsored by: LeftHand NetworksLeftHand's Virtual SAN Appliance for VMware is the industry's first full-featured, virtual iSCSI SAN.
-
VMware ACE 2
Sponsored by: VMware, Inc.Complex desktop environments have proven difficult for deployments, maintenance, and control. Download this free trial from VMware which combines the power and versatility of virtual machines with the security and control of centrally managed PCs
-
Hitachi Storage Solutions at Work
Sponsored by: Hitachi VantaraThis white paper highlights how a financial organization was able to secure their banking and transaction data with Hitachi Storage Solutions. Read this white paper to learn how they did it and how they overcame many of their storage challenges.
-
The Case for Application Security: How Real Is the Threat and What Are Your Options
Sponsored by: Fortify SoftwareThis white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
-
From Unstructured to Structured: Transforming Documents into Knowledge
Sponsored by: Pitney Bowes Group 1 SoftwareAs global marketplace and compliance laws become more complex, the need for enterprise content management systems has never been greater. Learn how electronic document management technology can increase ROI and secure information sensitive documents.
-
An Objective Approach to Security
Sponsored by: Bytware, Inc.i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
-
New E-Guide: Securing and Consolidating Remote and Branch Offices
Sponsored by: BrocadeThe remote office/branch office (ROBO) is now a main part of many organizations' storage initiatives. This eGuide, featuring articles from Storage magazine, outlines the issues of protecting ROBO data and provides insight and strategies for...
-
DatAdvantage: Comprehensive Data Governance
Sponsored by: VaronisThis paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
-
DataPrivilege: Entitlement Management Where It Belongs - With Business Owners
Sponsored by: VaronisIn most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...
-
The Business Case for Data Access Governance
Sponsored by: VaronisThis white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
-
Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
Sponsored by: Symantec CorporationThis paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
-
The High Stakes of Security: Protecting Your Brand
Sponsored by: IBM Software GroupThis white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
-
Business Continuity Self-Assessment Tool
Sponsored by: IBM Software GroupThe Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas.
-
The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
Sponsored by: ImpervaRead this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
-
Best Practices for Windows Vista Planning, Migration, and Ongoing Management
Sponsored by: Symantec CorporationIt is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
-
A Pathway to PCI Compliance
Sponsored by: ImprivataThis white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
-
Email Security Eguide
Sponsored by: Sunbelt SoftwareEmail security and spam only get more difficult to control as spammers get more sophisticated. Read this eGuide from SearchWindowsSecurity.com contributors to get a better understanding of just how big a threat spam is and what to do about it.
-
Accelerating Business Value for Microsoft 2007
Sponsored by: EMC CorporationBefore deploying any of the new Microsoft 2007 products, learn how EMC solutions dramatically reduce customer costs, support enterprise-level availability, and enhance the security and management of messaging systems.
-
Symantec Mail Security for SMTP
Sponsored by: Symantec CorporationTry this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
-
Best Practices for Printer Management in the Oracle E-Business Suite
Sponsored by: Unitask, Inc.Managing printers within the Oracle E-Business Suite is a complicated and time consuming matter. Read this white paper to learn best practices in printer management for Oracle applications.