Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Forensics

RSS Feed    Add to Google    Add to My Yahoo!
Forensics White Papers (View All Report Types)
 
MarketScope for E-Discovery Software Product Vendors
sponsored by Clearwell Systems
WHITE PAPER: Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs.
Posted: 18 Nov 2010 | Published: 21 Dec 2009

Clearwell Systems

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Study: How to make mobile successful within the organisation – what every CEO needs to know
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Matrix42

Using Case Management to Empower Employees and transform Customer Service
sponsored by Kofax, Inc.
WHITE PAPER: This white paper demonstrates how empowering your employees can lead to significantly improved customer service. Learn how dynamic case management applications can assist in delivering employee empowerment and transform the customer experience.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Kofax, Inc.

Take Back the Endpoint
sponsored by Kaspersky Lab
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Kaspersky Lab

IBM Flexible IT Work Environment
sponsored by IBM
WHITE PAPER: With IBM Flexible IT Work Environment solutions, employees can communicate with key individuals, groups or departments using consistent Web interfaces.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Network Faxing With Open Text Network Servers
sponsored by OpenText
WHITE PAPER: This resource highlights the benefits of network fax servers over traditional standalone fax machines, from reduced cost to enhanced productivity.
Posted: 11 Apr 2012 | Published: 30 Oct 2009

OpenText

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint
sponsored by IBM
WHITE PAPER: This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns?
Posted: 09 Apr 2009 | Published: 31 Dec 2008

IBM

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Mac OS X persistent evidences for forensic purposes
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

SearchSecurity.com

E-Guide: Database Tools for Auditing and Forensics
sponsored by SearchSecurity.com
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

SearchSecurity.com

Increase Your Web Performance Now
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper addresses the issues with website performance and how you can ensure that you deliver only the fastest content to your consumers. Click on the link below to discover tips and tricks for optimizing your websites, new ways to measure KPI's, and overall, how to sharpen your competitive edge.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Limelight Networks, Inc.

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

Hackers Open Malware Backdoor in Apache Webservers
sponsored by SearchSecurity.com
EGUIDE: A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks
sponsored by SearchSecurity.com
EGUIDE: This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Learn what to include in a proactive threat management program
sponsored by Alert Logic
WHITE PAPER: This handy resource gives you the ten steps to successful threat management.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Connecting the Dots: How Threat Intelligence Uses its Data
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper demonstrates how truly effective threat intelligence systems work by presenting a case study where a threat intelligence system was used to uncover the source of an attack.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

10 Myths About Cyber Threat Intelligence: Separating Fact from Fiction
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper clears up 10 common misconceptions surrounding threat intelligence, helping you separate fact from fiction to determine whether or not you could benefit from deploying it in your organization.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Cyveillance, Inc.

Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

IBM

Defensible preservation and collection
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to identify the risks posed by deficient data collection, how to use forensic principles for targeted collections and the relationship between preservation scale and costs.
Posted: 20 Jun 2014 | Premiered: 24 Jun 2014

SearchCompliance.com

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement