Security Software Research
-
Not all Malware Detection is Created Equal
Sponsored by: SophosThe internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
-
Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.
Sponsored by: AVG Technologies USA, Inc.Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.
-
Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition
Sponsored by: AVG Technologies USA, Inc.The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.
-
Secure File Transfer Solution Saves Bank Time and Money
Sponsored by: Linoma SoftwareIntegra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
-
Protecting the Dynamic Datacenter
Sponsored by: Trend MicroTrend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
-
Presentation Transcript: College of Virtualization - Lessons in Integrating Data Protection Software
Sponsored by: Dell and VMwareIn this SearchStorage.com presentation transcript, you'll see an overview of data protection software. You'll recieve some general advice, business and technology considerations, as well as some deployment considerations and configurations.
-
IT Decision Checklist: SIMs and Log Management
Sponsored by: LogLogic, Inc.In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
-
Information Security - IT Decision Checklist: Application Security
Sponsored by: Ounce Labs, an IBM CompanyStandards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.
-
Symantec Report on Rogue Security Software
Sponsored by: Symantec CorporationThe Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
-
Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
Sponsored by: Novell, Inc.Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
-
7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
Sponsored by: Qualys, Inc.Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
-
Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
Sponsored by: Novell, Inc.Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
-
Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
Sponsored by: Panda SecurityLearn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
-
Guide: Patch Authority Ultimate
Sponsored by: ScriptLogic CorporationWith exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
-
Guide: Enterprise Security Reporter
Sponsored by: ScriptLogic CorporationIn large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
-
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
Sponsored by: Sunbelt SoftwareEndpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
-
VIPRE Takes A Bite Out Of Bloatware
Sponsored by: Sunbelt SoftwareSunbelt Software's new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans.
-
Symantec Protection Suite Enterprise Edition
Sponsored by: Symantec CorporationSymantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
The Value of Integrated Security
Sponsored by: Cisco Systems, Inc.Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
-
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
Sponsored by: Symantec CorporationThis presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
-
Data Loss Prevention Survey
Sponsored by: Symantec CorporationTake this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
-
Control Compliance Suite Trialware
Sponsored by: Symantec CorporationControl Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
-
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
Sponsored by: Symantec CorporationWith this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: IBMThis paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.