Information Security Research
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
Expert eBook: Encryption: Properly Securing Your Valuable Data
Sponsored by: Information Security MagazineCheck out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
-
Ensure Data Protection with Sun StorageTek T10000B Tape Drives
Sponsored by: Sun StorageTekLearn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
-
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Sponsored by: Juniper Networks, Inc.Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
-
Defining Your Corporate Mobile Policies
Sponsored by: TechTarget SecurityIt's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
2008 Verizon Business Data Breach Investigations Report
Sponsored by: Verizon BusinessCheck out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
-
The 2008 (ISC)2 Global Information Security Workforce Study
Sponsored by: ISC2Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
-
3 Key Components of a Risk-Based Security Plan
Sponsored by: Foundstone, Inc.This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
-
Remote Data Protection
Sponsored by: IBMThanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support.
-
Hudson Advisors Protects Corporate and Customer Data from Wireless Threats
Sponsored by: AirTight Networks, Inc.Hudson Advisors IT team choosed AirTight's SpectraGuard Enterprise as the best WIPS and wireless performance management solution for their needs.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
Readers' Choice Awards
Sponsored by: Information Security MagazineInformation Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
-
Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments
Sponsored by: Akamai TechnologiesFor today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally.
-
Acquire a global view of your organization's security state: the importance of security assessments
Sponsored by: IBM Software GroupSecurity assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
-
Effectively manage access to systems and information to help optimize integrity and facilitate compliance
Sponsored by: IBM Software GroupConsistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
-
2006 Global Information Security Workforce Study
Sponsored by: ISC2Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
-
The importance of security assessments
Sponsored by: IBMThis white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance
Sponsored by: IBMThis paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor...
-
Global Threat Research Report: Russia
Sponsored by: VeriSign, IncThis report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
-
Potomac Hospital Case Study
Sponsored by: SonicWALLIn this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
-
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
Sponsored by: SonicWALLSSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
-
The Business Case for Data Access Governance
Sponsored by: VaronisThis white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
-
DatAdvantage: Comprehensive Data Governance
Sponsored by: VaronisThis paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...