Defining Your Corporate Mobile Policies
sponsored by TechTarget Security
EGUIDE:
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008
|
|
|
eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE:
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER:
The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008
|
|
|
Business Value Analysis Study: Citizens Business Bank
sponsored by Symantec Corporation
WHITE PAPER:
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
Posted: 09 Mar 2009 | Published: 09 Mar 2009
|
|
|
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
sponsored by IBM
PRESS RELEASE:
Check out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER:
Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO:
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009
|
|
|
Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER:
To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008
|
|
|
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by TechTarget ComputerWeekly.comĀ
EBOOK:
Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008
|
|
|
Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER:
Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008
|
|
|
Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST:
Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008
|
|
|
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST:
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008
|
|
|
Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK:
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008
|
|
|
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST:
Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)
|
|
|
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008
|
|
|
3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008
|
|
|
Remote Data Protection
sponsored by IBM
WHITE PAPER:
Thanks to IBM's Remote Data Protection Service you can efficiently back up your data so that it can be more easily recovered in the event of a disaster. This pay-as-you-use subscription service includes hardware, software and operational support.
Posted: 29 May 2008 | Published: 29 May 2008
|
|
|
Hudson Advisors Protects Corporate and Customer Data from Wireless Threats
sponsored by AirTight Networks, Inc.
CASE STUDY:
Hudson Advisors IT team choosed AirTight's SpectraGuard Enterprise as the best WIPS and wireless performance management solution for their needs.
Posted: 16 May 2008 | Published: 01 Jan 2007
|
|
|
Oracle Global IT (GIT) Streamlined Security
sponsored by Qualys, Inc.
CASE STUDY:
With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
Posted: 10 May 2008 | Published: 01 Apr 2007
|
|
|
Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE:
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008
|
|
|
Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments
sponsored by Akamai Technologies
WHITE PAPER:
For today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally.
Posted: 07 Mar 2008 | Published: 01 Sep 2007
|
|
|
Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER:
Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER:
Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006
|
|
|
The importance of security assessments
sponsored by IBM
WHITE PAPER:
This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|