ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Research

  • Methods, Motivations, and Mitigation of Insider Threats

    Sponsored by: VeriSign, Inc

    This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.

  • Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance

    Sponsored by: IBM

    This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...

  • Global Threat Research Report: Russia

    Sponsored by: VeriSign, Inc

    This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.

  • Potomac Hospital Case Study

    Sponsored by: SonicWALL

    In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.

  • Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All

    Sponsored by: SonicWALL

    SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.

  • The Business Case for Data Access Governance

    Sponsored by: Varonis

    This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.

  • DatAdvantage: Comprehensive Data Governance

    Sponsored by: Varonis

    This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...

  • A Pathway to PCI Compliance

    Sponsored by: Imprivata

    This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

  • Best Practices for Printer Management in the Oracle E-Business Suite

    Sponsored by: Unitask, Inc.

    Managing printers within the Oracle E-Business Suite is a complicated and time consuming matter. Read this white paper to learn best practices in printer management for Oracle applications.

  • Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them

    Sponsored by: VeriSign, Inc

    The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.

  • The ILM Puzzle: EMC Puts All the Pieces Together

    Sponsored by: EMC Corporation

    ILM applies policies ensuring information is managed throughout its lifecycle. Learn as Data Mobility Group discuss how EMC ILM delivers a tactical solution while laying the groundwork for a much broader and ambitious ILM strategy.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • What's New in Group Policy Administrator 5.0

    Sponsored by: SUSE

    Managing Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.

  • Service Management with AppManager

    Sponsored by: SUSE

    Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.

  • VigilEnt Policy Center 4.2 Trial

    Sponsored by: SUSE

    VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.

  • NetIQ Security Solutions for iSeries Trial

    Sponsored by: SUSE

    NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.

  • Directory and Resource Administrator 7.5 Trial

    Sponsored by: SUSE

    NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.

  • Ensuring VoIP Quality of Service

    Sponsored by: SUSE

    Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.

  • AppManager 6.0.2 Trial

    Sponsored by: SUSE

    The NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.

  • Introducing AppManager 6.0

    Sponsored by: SUSE

    Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.

  • Addressing the Insider Threat with NetIQ Operational Change Control Solutions

    Sponsored by: SUSE

    Download "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.

  • Sophos Email Security Appliances

    Sponsored by: Sophos

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.