ComputerWeekly.com Research Library

Powered by Bitpipe.com

Physical Security Research

  • Building the Right Mobile Security Toolkit

    Sponsored by: SearchSecurity.com

    Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • Achieving Disaster Recovery with Virtualization

    Sponsored by: Dell Compellent

    Implementing disaster recovery is both time consuming and costly. And as an IT pro, you are constantly on the look out for new strategies that can help make the process more cost-efficient. Learn how turning to virutalization can help simplify your disaster recovery initiatives and more.

  • Cloud-Based Data Protection

    Sponsored by: Iron Mountain

    To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.

  • Achieving Security With Cloud Data Protection

    Sponsored by: Iron Mountain

    Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.

  • Unified network traffic monitoring for physical and VMware environments

    Sponsored by: NetFort Technologies Ltd

    This white paper outlines an approach, based on monitoring network traffic, that delivers a unified view of network activity across virtual and physical components of the network.

  • A Practical Guide to Cloud Computing Security

    Sponsored by: Avanade

    Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.

  • Achieving Financial and Functional Advantages in Connected Building Solutions with the Unified Physical Infrastructure℠(UPI)

    Sponsored by: Panduit

    Read this paper to learn about being connected building planning requires tightly integrated, well-coordinated cross-functional communication and project management across four functional phases: organizational alignment, technology strategies, network design considerations, and financial analysis.

  • The Unified Physical Infrastructure Approach

    Sponsored by: Panduit

    In this paper, you'll learn that UPI-based solutions provide superior business value, helping customers keep pace with technology innovations and build a smarter, unified business foundation.

  • Going Green While Reducing Operational Costs

    Sponsored by: IBM

    Review this document based on an IBM/TechTarget Webcast entitled "Going Green While Reducing Operational Costs" to learn what experienced analyst Joe Clabby has to say about data centers and facilities.

  • Take a Holistic Approach to Business Driven Security

    Sponsored by: IBM

    Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.

  • Acquire a global view of your organization's security state: the importance of security assessments

    Sponsored by: IBM Software Group

    Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.

  • The importance of security assessments

    Sponsored by: IBM

    This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.

  • Drive business value with innovation for security defense

    Sponsored by: IBM

    This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.

  • A Pathway to PCI Compliance

    Sponsored by: Imprivata

    This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.