Security Policies Research
-
Developers and Identity Services - Tackling Identity Data with Identity Hub
Sponsored by: Oracle CorporationThis paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
-
Small Business Security: What You Need to Know
Sponsored by: Cisco Systems, Inc.Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
-
Enterprise Security Solutions by Trend Micro
Sponsored by: Trend Micro, Inc.This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
-
IBM Tivoli Security User Compliance Management Demo
Sponsored by: IBMThis demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
-
Enabling Developer Access to Production Data
Sponsored by: Voltage Security, Inc.With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
-
Ethical Hacking and Risk Assessments
Sponsored by: Global KnowledgeAttend this webcast to learn about risk assessment process and tools used by ethical hackers.
-
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
Sponsored by: MarkMonitorNationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
-
Network Security Checklist
Sponsored by: Cisco Systems, Inc.Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
-
Defining Your Corporate Mobile Policies
Sponsored by: TechTarget SecurityIt's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
-
Developing an Effective Corporate Mobile Policy
Sponsored by: BlackBerryBy now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
-
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
Sponsored by: LumensionBooz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
-
Parkview Adventist Medical Center Clinicians Get Security at Their Fingertips with Imprivata
Sponsored by: ImprivataBy incorporating finger biometric scanning into the solution, Parkview would enable each doctor or nurse to log on to any PC at the facility with a single fingertip swipe.
-
Building a Secure and Compliant Windows Desktop
Sponsored by: BeyondTrust CorporationRemoving administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
-
A Pathway to PCI Compliance
Sponsored by: ImprivataThis white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
-
The Threats Posed by Portable Storage Devices
Sponsored by: GFI SoftwareThis white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
-
Top 5 IT Considerations for Secure Wireless Email
Sponsored by: Sybase iAnywhereThe use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
-
Cascading Risk
Sponsored by: Core Security TechnologiesThis webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
-
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
Sponsored by: Symantec CorporationThis white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
-
Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
Sponsored by: Forescout Technologies, Inc.Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
-
Best Practices for Deploying LAN Security and NAC
Sponsored by: Nevis NetworksDownload this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
10 Steps to Mobile Security
Sponsored by: Sybase iAnywhereSecurity is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
-
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
Sponsored by: SecureWaveThis article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
-
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
Sponsored by: Symantec CorporationInstant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.