ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Protecting SharePoint Data Long Term

    Sponsored by: Varonis

    This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.

  • Lowering Risk by Applying Consistent Security Across All of Your Locations

    Sponsored by: Juniper Networks, Inc.

    Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • eBook-- Defining an Email-Archiving Policy

    Sponsored by: Symantec Corporation

    Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

  • Cisco IT GRC Security Assessment Service

    Sponsored by: Cisco Systems, Inc.

    Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.

  • Information Security Magazine, June 2009 - SIMs: More than just a pile of logs

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

  • Cisco Security Solutions - A Reference Guide

    Sponsored by: Cisco Systems, Inc.

    This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.

  • The Value of Integrated Security

    Sponsored by: Cisco Systems, Inc.

    Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.

  • The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies

    Sponsored by: IronKey

    Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.

  • eBook: Virtualization Security

    Sponsored by: Informa TechTarget

    Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.

  • eBook: Encryption 360 Degrees

    Sponsored by: Informa TechTarget

    Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.

  • eBook: Understanding GRC

    Sponsored by: Informa TechTarget

    This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.

  • Governance, Risk, Compliance: Policy Management - Methods and tools

    Sponsored by: TechTarget Security

    This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.

  • Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee

    Sponsored by: Information Security Magazine

    This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.

  • Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.

  • Information Security Magazine: March 2009 - Sky-High Risk?

    Sponsored by: Information Security Magazine

    This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.

  • E-Book: Log Management for Compliance

    Sponsored by: TechTarget Security

    Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.

  • e-Guide: Windows Server Disaster Recovery - Planning for the Worst

    Sponsored by: AppAssure Software, Inc.

    The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.

  • New Security Solutions Using Intel vPro Technology

    Sponsored by: Intel Corporation

    Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.

  • Success with Static Analysis for Security: Why Code Audits Fail

    Sponsored by: Parasoft Corporation

    This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  • Essential Guide to Threat Management

    Sponsored by: Information Security Magazine

    Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.

  • The CIO's Guide to Mobile Security

    Sponsored by: BlackBerry

    Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.

  • Developers and Identity Services - Tackling Identity Data with Identity Hub

    Sponsored by: Oracle Corporation

    This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.