Information Security Research
-
Defining Your Corporate Mobile Policies
Sponsored by: TechTarget SecurityIt's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
-
eGuide: Essential Guide to Identity & Access Management
Sponsored by: Information Security MagazineThis essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Laws, regulations and compliance: Top tips for keeping your data under your Control
Sponsored by: Sophos UKThe challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
-
Business Value Analysis Study: Citizens Business Bank
Sponsored by: Symantec CorporationAs a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
-
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
Sponsored by: IBMCheck out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
-
Protection on demand: information security that works for you - instead of putting you to work.
Sponsored by: IBMCheck out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
-
Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
Sponsored by: Tripwire, Inc.To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comĀCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
Expert eBook: Encryption: Properly Securing Your Valuable Data
Sponsored by: Information Security MagazineCheck out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
-
Ensure Data Protection with Sun StorageTek T10000B Tape Drives
Sponsored by: Sun StorageTekLearn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
-
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Sponsored by: Juniper Networks, Inc.Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
2008 Verizon Business Data Breach Investigations Report
Sponsored by: Verizon BusinessCheck out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
-
The 2008 (ISC)2 Global Information Security Workforce Study
Sponsored by: ISC2Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
-
3 Key Components of a Risk-Based Security Plan
Sponsored by: Foundstone, Inc.This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
-
Remote Data Protection
Sponsored by: IBMThanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support.
-
Hudson Advisors Protects Corporate and Customer Data from Wireless Threats
Sponsored by: AirTight Networks, Inc.Hudson Advisors IT team choosed AirTight's SpectraGuard Enterprise as the best WIPS and wireless performance management solution for their needs.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
Readers' Choice Awards
Sponsored by: Information Security MagazineInformation Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
-
Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments
Sponsored by: Akamai TechnologiesFor today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally.
-
Acquire a global view of your organization's security state: the importance of security assessments
Sponsored by: IBM Software GroupSecurity assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
-
Effectively manage access to systems and information to help optimize integrity and facilitate compliance
Sponsored by: IBM Software GroupConsistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
-
2006 Global Information Security Workforce Study
Sponsored by: ISC2Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
-
The importance of security assessments
Sponsored by: IBMThis white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.