Security Research
-
Magic Quadrant for Endpoint Protection Platforms
Sponsored by: SophosGartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
Governance, Risk, Compliance: Policy Management - Methods and tools
Sponsored by: TechTarget SecurityThis E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.
-
eBook: A Holistic Approach to Data Protection
Sponsored by: TechTarget CIOIn this eBook the SearchCIO.com team discusses how Data Protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
-
Information Security Magazine: March 2009 - Sky-High Risk?
Sponsored by: Information Security MagazineThis month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
-
Securing the Organization: Creating a Partnership between HR and Information Security
Sponsored by: ISC2The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
-
New Security Solutions Using Intel vPro Technology
Sponsored by: Intel CorporationIntel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThe Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
-
Cisco Continuous Data Protection for Files
Sponsored by: Cisco Systems, Inc.Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
-
Web Services Security: What's Required to Secure a Service-Oriented Architecture
Sponsored by: Oracle CorporationThis white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
-
IBM Lotus Complete Collaboration Express Starter Pack
Sponsored by: IBMCheck out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.
-
Symantec IT Compliance Solution
Sponsored by: Symantec CorporationSymantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
-
Jumping on the Cloud-Wagon? AppZero's Virtual Application Appliance Approach
Sponsored by: AppZeroThis paper explains the attributes of AppZero's VAA approach to server-side application virtualization and conveys various advantages in the cloud environment.
-
Data Protection for the Mobile Workforce - Presentation Transcript
Sponsored by: DellEMC and IntelĀ®This presentation transcript shares with you some of the best ways you can deal with the security challenges associated with your mobile workforce - including data loss and system unavailability.
-
Support PCI Security Compliance with Enhanced Solutions from IBM
Sponsored by: IBMThis white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
-
Reducing the Cost of Electronic Gaming Machine Support with Intel® vPro Technology
Sponsored by: WiproThis paper illustrates the expected cost savings of deploying this technology to support electronic gaming operations.
-
Unsung Heroes - How Routing & Switching Keep the Business Going
Sponsored by: Cisco Systems, Inc.Routers and switches are the building blocks for all business communications from data to voice and video to wireless access.
-
Small Business Networking: The Basics
Sponsored by: Cisco Systems, Inc.Small business networking begins with a secure, reliable, fast data network foundation. This paper fleshes out 7 ways small business networking can transform your company.
-
Small Business Firewall Software Vs. Hardware Firewalls
Sponsored by: Cisco Systems, Inc.Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
-
Managing Risk in Outsourced Manufacturing
Sponsored by: E2openThis white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks.
-
Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
Sponsored by: MicrosoftThis document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
-
Solaris 10 Operating System Innovation Matters-Increase Business Efficiency and Lower Costs
Sponsored by: Sun Microsystems, Inc.The Solaris OS is the strategic platform for today's demanding enterprise and is the only open operating system that has delivered proven results, running everything from mission-critical enterprise databases to high performance Web farms.
-
Mission Critical Services
Sponsored by: Hewlett Packard EnterpriseIn this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
-
Five Ways Deploying Windows Vista Just Got Easier
Sponsored by: MicrosoftThis article explores some of the new capabilities of Windows Vista, our new set of deployment tools, and ways that you can benefit from these tools to make the process of deploying Windows Vista much easier.