Data Security Research
-
Tripwire Enterprise Datasheet
Sponsored by: Tripwire, Inc.Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
Achieve and Maintain Compliance with the Payment Card Industry (PCI) Data Security Standard
Sponsored by: Ecora SoftwareNew white paper on PCI DSS - learn key steps for validating compliance with the PCI Data Security Standard, why companies should take PCI compliance seriously and secrets for successful PCI audits and consistent compliance.
-
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
Sponsored by: SecureWaveThis article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
-
Enterprise-Grade Wireless LAN Security
Sponsored by: SiemensThis white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
-
CIO Perspective: BlackBerry Security
Sponsored by: BlackBerryIn this question and answer session, learn how Dr. John D. Halamka. MD, of the Harvard Medical School, depends on a BlackBerry Solution to keep his patient and student records secure.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
Sponsored by: MicrosoftAttend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Is Your Data Protected?
Sponsored by: Hitachi VantaraAttend this Podcast to learn how protecting your organization's data can also help improve operational efficiency and operational resilience.
-
Authentication Tokens: The Key to Secure PCs and Data
Sponsored by: Aladdin Knowledge SystemsThis white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
-
Webroot Enterprise Spy Audit
Sponsored by: OpenText Security SolutionsSpyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach
Sponsored by: MicrosoftAttend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
CitiStreet Enhances Data Recovery Capabilities with Remote
Sponsored by: Datalink CorpThis case study looks at why Datalink recommended and ultimately implemented Network Appliance Fabric-Attached Storage (FAS) systems with disk-based WORM storage and replication capabilities for CitiStreet's distary recovery needs.
-
Information-Centric Security and Data Erasure
Sponsored by: EMC CorporationMost data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
-
Internet Security and Acceleration Server 2006
Sponsored by: MicrosoftISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
-
Pod Slurping - An Easy Technique for Stealing Data
Sponsored by: GFI SoftwareIn this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
-
Symantec IM Manager
Sponsored by: Symantec CorporationSymantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
-
Best Practices for Protecting Microsoft Exchange
Sponsored by: Symantec CorporationThe right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
-
Sophos Email Security Appliances
Sponsored by: SophosThe Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.