IT Management  >   Systems Operations  >   Security  >  

Information Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Infosecurity
DEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive  … 
Definition continues below.
Information SecurityWhite Papers (View All Report Types)
151 - 175 of 204 Matches Previous Page  | Next Page
Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER: Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

IBM Flexible IT Work Environment
sponsored by IBM
WHITE PAPER: The global nature of today's workplace makes it imperative that employees have access to critical business information and applications. Providing this without sacrificing productivity or security is a major concern. This white paper details IBM's solution to these challenges - The IBM Flexible IT Work Environment.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Web Threats: Challenges and Solutions
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

Trend Micro, Inc.

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER: To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008

Tripwire, Inc.

Operations Energy Management: From Data Center through Facilities
sponsored by CA Technologies.
WHITE PAPER: Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center.
Posted: 10 Dec 2008 | Published: 13 Oct 2008

CA Technologies.

Virtual Criminology Report Cybercrime versus Cyberlaw
sponsored by McAfee, Inc.
WHITE PAPER: Global cybercrime has a significant impact on businesses and consumers across the globe. Read this whitepaper for a discussion on the extent to which cyberlaw is keeping up with the crimes being committed, and bring to justice the perpetrators of c...
Posted: 10 Dec 2008 | Published: 10 Dec 2008

McAfee, Inc.

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

Best Practices for Managing Software Intellectual Property
sponsored by Black Duck Software
WHITE PAPER: This paper describes the approaches for managing intellectual property during component-based software development, detailing the seven best practices an organization should adhere by to facilitate the successful management of software IP.
Posted: 13 Oct 2008 | Published: 01 Jun 2007

Black Duck Software

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network.
Posted: 10 Oct 2008 | Published: 05 Aug 2009

Mimecast

Practical Steps to Mitigate Virtualization Security Risks
sponsored by Tripwire, Inc.
WHITE PAPER: Read this whitepaper to learn seven practical steps that IT organizations can take to mitigate the unique security challenges of virtualization. While some are directed specifically at virtualized environments, many of these steps are best practices.
Posted: 10 Oct 2008 | Published: 01 Apr 2008

Tripwire, Inc.

Malware: Just What You Need to Know
sponsored by Sunbelt Software
WHITE PAPER: There are ten things you can start doing today to boost your malware protection and take things to the next level. This paper provides insights and tips regarding malware and how to protect your networks from it.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

Sunbelt Software

Effective Security with a Continuous Approach to ISO 27001 Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Tripwire, Inc.

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Remote Data Protection
sponsored by IBM
WHITE PAPER: Thanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support.
Posted: 29 May 2008 | Published: 29 May 2008

IBM

Demystifying Data Loss Prevention: Requirements for Comprehensive Protection
sponsored by DynTek Inc. and McAfee
WHITE PAPER: Learn how Data Loss Prevention technology provides unprecedented visibility intohow data is used, and by whom, why, and when. With this insight, you can define and enforce data usage policies that help prevent both accidental and malicious data loss.
Posted: 21 May 2008 | Published: 01 May 2008

DynTek Inc. and McAfee

Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

Strengthening Data Privacy in PeopleSoft
sponsored by Approva Corporation
WHITE PAPER: Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss.
Posted: 09 May 2008 | Published: 01 Mar 2008

Approva Corporation

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency
sponsored by F5 Networks
WHITE PAPER: Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency.
Posted: 28 Apr 2008 | Published: 01 May 2007

F5 Networks

How to Protect Your Critical Resources with Identity-based Access Control
sponsored by AEP Networks
WHITE PAPER: This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges.
Posted: 23 Apr 2008 | Published: 01 Apr 2008

AEP Networks

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.
Posted: 03 Apr 2008 | Published: 03 Apr 2008

Websense, Inc.

Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments
sponsored by Akamai Technologies
WHITE PAPER: For today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally.
Posted: 07 Mar 2008 | Published: 01 Sep 2007

Akamai Technologies

Protecting Confidential Documents in the Extended Enterprise: Common Misconceptions and Best-Practice Strategies
sponsored by Brainloop Inc.
WHITE PAPER: This white paper discusses the enormous cost of data breaches, the rising importance of data security, and common misconceptions that exacerbate the problem of protecting your company's most important and confidential information.
Posted: 25 Feb 2008 | Published: 25 Feb 2008

Brainloop Inc.

Payment Card Industry (PCI) Data Security Standard
sponsored by Bsafe Information Systems
WHITE PAPER: This document is supported by Bsafe/ES Modules such as Bsafe Network Log, Bsafe Analyzer, Bsafe Traffic Analyzer, Bsafe Archive Central Audit, Bsafe Simulator, Bsafe IDS (alerts) and Bsafe IPS.
Posted: 22 Feb 2008 | Published: 01 Feb 2008

Bsafe Information Systems
151 - 175 of 204 Matches Previous Page    5 6 7 8 9    Next Page
 
INFORMATION SECURITY DEFINITION (continued): … COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.
Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement