ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Tripwire Enterprise Datasheet

    Sponsored by: Tripwire, Inc.

    Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol

  • Mobile Data Security Essentials for Your Changing, Growing Workforce

    Sponsored by: CREDANT Technologies

    Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.

  • Achieve and Maintain Compliance with the Payment Card Industry (PCI) Data Security Standard

    Sponsored by: Ecora Software

    New white paper on PCI DSS - learn key steps for validating compliance with the PCI Data Security Standard, why companies should take PCI compliance seriously and secrets for successful PCI audits and consistent compliance.

  • Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk

    Sponsored by: SecureWave

    This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

  • Enterprise-Grade Wireless LAN Security

    Sponsored by: Siemens

    This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.

  • CIO Perspective: BlackBerry Security

    Sponsored by: BlackBerry

    In this question and answer session, learn how Dr. John D. Halamka. MD, of the Harvard Medical School, depends on a BlackBerry Solution to keep his patient and student records secure.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Is Your Data Protected?

    Sponsored by: Hitachi Vantara

    Attend this Podcast to learn how protecting your organization's data can also help improve operational efficiency and operational resilience.

  • Authentication Tokens: The Key to Secure PCs and Data

    Sponsored by: Aladdin Knowledge Systems

    This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.

  • Webroot Enterprise Spy Audit

    Sponsored by: OpenText Security Solutions

    Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • CitiStreet Enhances Data Recovery Capabilities with Remote

    Sponsored by: Datalink Corp

    This case study looks at why Datalink recommended and ultimately implemented Network Appliance Fabric-Attached Storage (FAS) systems with disk-based WORM storage and replication capabilities for CitiStreet's distary recovery needs.

  • Information-Centric Security and Data Erasure

    Sponsored by: EMC Corporation

    Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.

  • Internet Security and Acceleration Server 2006

    Sponsored by: Microsoft

    ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.

  • Pod Slurping - An Easy Technique for Stealing Data

    Sponsored by: GFI Software

    In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.

  • Symantec IM Manager

    Sponsored by: Symantec Corporation

    Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.

  • Best Practices for Protecting Microsoft Exchange

    Sponsored by: Symantec Corporation

    The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.

  • Sophos Email Security Appliances

    Sponsored by: Sophos

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.