Security Management Research
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
Sponsored by: Information Security MagazineThis special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
-
Information Security Magazine: March 2009 - Sky-High Risk?
Sponsored by: Information Security MagazineThis month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
-
E-Book: Log Management for Compliance
Sponsored by: TechTarget SecurityLog management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.
-
Application Discovery Tool
Sponsored by: SophosWith the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
-
Securing the Organization: Creating a Partnership between HR and Information Security
Sponsored by: ISC2The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
-
New Security Solutions Using Intel vPro Technology
Sponsored by: Intel CorporationIntel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
-
Data Loss Prevention Survey
Sponsored by: Symantec CorporationTake this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
-
Control Compliance Suite Trialware
Sponsored by: Symantec CorporationControl Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
-
Laws, regulations and compliance: Top tips for keeping your data under your Control
Sponsored by: Sophos UKThe challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
-
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
Sponsored by: Symantec CorporationWith this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
-
Business Value Analysis Study: Citizens Business Bank
Sponsored by: Symantec CorporationAs a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
-
Virtual Data Center eZine - Volume 7
Sponsored by: Virtual Data Center eZine - Volume 7Cloud computing has loads of potential for data centers -- the ability to pool resources, charge customers based on actual usage and tap into extra external capacity when needed.
-
THINWORX Version 4.0
Sponsored by: THINWORXdownload this trial software which addresses the high cost and complexity of implementing a server based computing solution.
-
Laws, regulations and compliance: Top tips for keeping your data under your control
Sponsored by: SophosThis paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
-
eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
Sponsored by: TechTarget SecurityCheck out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
-
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
Sponsored by: VeriSign EMEAA multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
-
The Five Productivity Benefits of a Secure Network
Sponsored by: Cisco Systems, Inc.A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed.
-
Achieving Compliance in a Virtualized Environment
Sponsored by: Tripwire, Inc.The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
-
Network Security for Small Business
Sponsored by: Cisco Systems, Inc.Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers.
-
Cisco ASA 5500 Series Adaptive Security Appliance
Sponsored by: Cisco Systems, Inc.In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
-
Leading the Way in Managed Services
Sponsored by: Zenith InfotechLearn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
-
Securing Business Communications Applications in Converged Networks - Best Practices
Sponsored by: Avaya Inc.Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.
-
The 2008 (ISC)2 Global Information Security Workforce Study
Sponsored by: ISC2Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.