Security Best Practices Research
-
Managed Office Protection: Switching from AV to SaaS
Sponsored by: Panda SecurityAntivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
-
Symantec Protection Suite Enterprise Edition
Sponsored by: Symantec CorporationSymantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
-
Web Based Attacks
Sponsored by: Symantec CorporationThis report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
Sponsored by: Symantec CorporationThis presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
-
Symantec Internet Security Threat Report: Trends for 2008
Sponsored by: Symantec CorporationThis report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
-
Security through Maturity: A Brief on Securing iSCSI Networks
Sponsored by: DellEMC and IntelĀ®Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
-
Magic Quadrant for Endpoint Protection Platforms
Sponsored by: SophosGartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
-
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
Sponsored by: Information Security MagazineThis special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
-
eBook: A Holistic Approach to Data Protection
Sponsored by: TechTarget CIOIn this eBook the SearchCIO.com team discusses how Data Protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue.
-
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
Sponsored by: Information Security MagazineCheck out this eBook and get expert advice that can help your company successfully improve its threat management posture.
-
Data Loss Prevention Survey
Sponsored by: Symantec CorporationTake this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
-
Control Compliance Suite Trialware
Sponsored by: Symantec CorporationControl Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThe Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
-
Security Bloopers: Five Common Mistakes
Sponsored by: Cisco Systems, Inc.IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.
-
Enterprise Security Solutions by Trend Micro
Sponsored by: Trend Micro, Inc.This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
-
Laws, regulations and compliance: Top tips for keeping your data under your control
Sponsored by: SophosThis paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
-
eBook: Strategies for Securing Virtual Machines
Sponsored by: Information Security MagazineCheck out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
-
The Modern Security Threat and Regulatory Compliance
Sponsored by: Bytware, Inc.SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Building a Secure and Compliant Windows Desktop
Sponsored by: BeyondTrust CorporationRemoving administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
-
DatAdvantage: Comprehensive Data Governance
Sponsored by: VaronisThis paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
-
The Business Case for Data Access Governance
Sponsored by: VaronisThis white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
-
Best Practices in Authentication and Access Control
Sponsored by: Nevis NetworksRead this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.