Security Policies Research
-
Protecting SharePoint Data Long Term
Sponsored by: VaronisThis paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
-
Lowering Risk by Applying Consistent Security Across All of Your Locations
Sponsored by: Juniper Networks, Inc.Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
eBook-- Defining an Email-Archiving Policy
Sponsored by: Symantec CorporationRead this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
-
Cisco IT GRC Security Assessment Service
Sponsored by: Cisco Systems, Inc.Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Cisco Security Solutions - A Reference Guide
Sponsored by: Cisco Systems, Inc.This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
-
The Value of Integrated Security
Sponsored by: Cisco Systems, Inc.Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
-
The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
Sponsored by: IronKeyCheck out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
-
eBook: Virtualization Security
Sponsored by: TechTargetSpace savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
-
eBook: Encryption 360 Degrees
Sponsored by: TechTargetData breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.
-
eBook: Understanding GRC
Sponsored by: TechTargetThis in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.
-
Governance, Risk, Compliance: Policy Management - Methods and tools
Sponsored by: TechTarget SecurityThis E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.
-
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
Sponsored by: Information Security MagazineThis special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
-
Information Security Magazine: March 2009 - Sky-High Risk?
Sponsored by: Information Security MagazineThis month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
-
E-Book: Log Management for Compliance
Sponsored by: TechTarget SecurityLog management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.
-
e-Guide: Windows Server Disaster Recovery - Planning for the Worst
Sponsored by: AppAssure Software, Inc.The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.
-
New Security Solutions Using Intel vPro Technology
Sponsored by: Intel CorporationIntel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
-
Success with Static Analysis for Security: Why Code Audits Fail
Sponsored by: Parasoft CorporationThis paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
-
Automated Compliance: Making the Case and Reaping the Rewards
Sponsored by: Tripwire, Inc.Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
-
Addressing Compliance Initiatives with Center for Internet Security Benchmarks
Sponsored by: Tripwire, Inc.This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
-
Essential Guide to Threat Management
Sponsored by: Information Security MagazineCheck out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
Sponsored by: Oracle CorporationThis paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.