Security Management Research
-
Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
Sponsored by: XTSThis white paper provides an analytical perspective on how to best manage your Citrix environment.
-
PCI Compliance Made Simple
Sponsored by: Alert LogicThis white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1, discusses best practices to achieve PCI compliance, and identifies which of these requirements can be satisfied by Alert Logic.
-
Oracle Database 11g Architecture on Windows
Sponsored by: Oracle CorporationLearn how Oracle continues to improve the performance, scalability, and capability of its Windows database server. This paper describes the architecture of the Oracle database on Windows and how it differs from its counterparts on UNIX and Linux.
-
Best Practices in Authentication and Access Control
Sponsored by: Nevis NetworksRead this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
-
Tripwire Enterprise Datasheet
Sponsored by: Tripwire, Inc.Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol
-
BlackBerry Enterprise Server for IBM Lotus Domino Version 4.1: Feature and Technical Overview
Sponsored by: BlackBerryLearn about the next step in wireless networking, the BlackBerry Enterprise Server. This paper provides an in-depth look at its architecture, components and key technical features.
-
Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
Sponsored by: VeriSign, IncThe drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
-
Moving on Up
Sponsored by: Information Security MagazineHow do you rise in the security ranks? Don't speak geek; use the language of business.