ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Managed Office Protection: Switching from AV to SaaS

    Sponsored by: Panda Security

    Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • Web Based Attacks

    Sponsored by: Symantec Corporation

    This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.

  • Top Benefits of Symantec Protection Suite

    Sponsored by: Symantec Corporation

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  • Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise

    Sponsored by: Symantec Corporation

    This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Security through Maturity: A Brief on Securing iSCSI Networks

    Sponsored by: DellEMC and IntelĀ®

    Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.

  • Magic Quadrant for Endpoint Protection Platforms

    Sponsored by: Sophos

    Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.

  • Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee

    Sponsored by: Information Security Magazine

    This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.

  • eBook: A Holistic Approach to Data Protection

    Sponsored by: TechTarget CIO

    In this eBook the SearchCIO.com team discusses how Data Protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue.

  • Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession

    Sponsored by: Information Security Magazine

    Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.

  • Data Loss Prevention Survey

    Sponsored by: Symantec Corporation

    Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.

  • Control Compliance Suite Trialware

    Sponsored by: Symantec Corporation

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.

  • Security Bloopers: Five Common Mistakes

    Sponsored by: Cisco Systems, Inc.

    IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.

  • Enterprise Security Solutions by Trend Micro

    Sponsored by: Trend Micro, Inc.

    This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Laws, regulations and compliance: Top tips for keeping your data under your control

    Sponsored by: Sophos

    This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

  • eBook: Strategies for Securing Virtual Machines

    Sponsored by: Information Security Magazine

    Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.

  • The Modern Security Threat and Regulatory Compliance

    Sponsored by: Bytware, Inc.

    SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.

  • Methods, Motivations, and Mitigation of Insider Threats

    Sponsored by: VeriSign, Inc

    This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.

  • Building a Secure and Compliant Windows Desktop

    Sponsored by: BeyondTrust Corporation

    Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.

  • DatAdvantage: Comprehensive Data Governance

    Sponsored by: Varonis

    This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...

  • The Business Case for Data Access Governance

    Sponsored by: Varonis

    This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.

  • Best Practices in Authentication and Access Control

    Sponsored by: Nevis Networks

    Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.