Security Research
-
Security Awareness with Protecting Information
Sponsored by: Information Shield, Inc.Protecting Information is a quarterly security and privacy awareness newsletter that you can easily customize and distribute to your entire organization.
-
Pizza Company Slices Travel Costs
Sponsored by: Citrix OnlineLearn how the world's third largest pizza company, Papa John's International, cuts travel costs by using GoToMeeting Corporate to meet with staff members and train franchisees in 49 states and 22 countries.
-
CyberFusion Integration Suite (CFI): Managed File Transfer (MFT)
Sponsored by: Proginet CorporationCyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution.
-
Assuring Asset Documentation Integrity
Sponsored by: McLaren SoftwareIn this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.
-
IDC White Paper: Diskless PCs: The Evolution of Enterprise PCs
Sponsored by: DellEMC and IntelĀ®Diskless PCs used in conjunction with image streaming software can provide a PC performance and compatibility experience that is identical to that of a standalone machine, but with all the benefits that centralized environments enable.
-
Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem
Sponsored by: NEC Corporation of AmericaData de-duplication has recently gained significant industry attention, especially for disk-based backup products.
-
Making it easier for people to access applications and information without compromising security
Sponsored by: IBM Software GroupThis white paper outlines the ways in which a simplified, focused work environment improves user access to enterprise application and information resources, enabling users to be more proactive, innovative and flexible in addressing business challenges.
-
Targeted Cyber Attacks
Sponsored by: GFI SoftwareCyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
-
Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
Sponsored by: Symantec CorporationServer provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
-
BlackBerry Smart Card Reader Security
Sponsored by: BlackBerryThrough an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
-
7 Types of Hard CISSP Exam Questions and How to Approach Them
Sponsored by: Global KnowledgeLearn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.