Risk Management Research
-
E-Discovery Cross-Border Data Compliance
Sponsored by: ExterroThis white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
-
Discovering Vulnerable Web Applications
Sponsored by: QualysThis paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
The Critical Incident Response Maturity Journey
Sponsored by: EMC CorporationThis paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
-
10 Network Security Tools and Tests Everyone Should Use
Sponsored by: Global KnowledgeThis paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
Eliminating E-Discovery Over-Collection
Sponsored by: ExterroThis informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
How to Leverage Free Tools to Secure Web Apps
Sponsored by: ImpervaExpert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Top 10 Reasons to Choose EMC Isilon for Hadoop Analytics
Sponsored by: EMC & ArrowThis white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
-
Software Security for Web Developers: Providing a Helping Hand
Sponsored by: ImpervaThis expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
-
Buyer's Criteria for Next-Generation Network Security
Sponsored by: SourcefireThis whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
-
Avoiding Compliance and Shadow IT Risks in the Cloud
Sponsored by: CloudPassageThis expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Executive Guide to SYSPRO Security for Auditing Assurance and Control
Sponsored by: SysproThis white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
-
Expert Best Practices to Prepare for Cloud-based ERP Systems
Sponsored by: Epicor Software CorporationThis expert e-guide explores the value of cloud options for enterprise resource planning (ERP) and zeros in on the potential risks of unsafe software as a service (SaaS) management practices.
-
Selecting a Next-Generation Firewall: Top 10 Considerations
Sponsored by: CiscoIn this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoAccess this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
-
Cisco 2014 Annual Security Report
Sponsored by: SourcefireThis in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
-
Secure Network Access for Personal Mobile Devices
Sponsored by: CiscoThis resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
-
Cisco 2014 Annual Security Report
Sponsored by: CiscoThis information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.