Security Infrastructure Reports

E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

Solving SAP® Application Access and Security Challenges with an Identity-Infused Enterprise
sponsored by Novell, Inc.
WHITE PAPER: In this white paper, discover how Systems, Applications and Products (SAP) can help organizations add secure access by infusing identity throughout their environments, without adding any workload.
Posted: 23 May 2011 | Published: 23 May 2011

Novell, Inc.

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware*
sponsored by Intel
WHITE PAPER: This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Intel

April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011

Information Security Magazine

PCI-Compliant Cloud Reference Architecture
sponsored by HyTrust
WHITE PAPER: This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

HyTrust

Smart Strategies for Securing Extranet Access
sponsored by Oracle Corporation
WHITE PAPER: Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.
Posted: 21 Mar 2011 | Published: 01 Mar 2010

Oracle Corporation

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security - an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Register Free to Visit Infosecurity Europe - 19th - 21st April 2011
sponsored by Infosecurity Europe
EVENT: Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

All resources sponsored by Infosecurity Europe

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Sophos Security Threat Report 2011
sponsored by Sophos
WHITE PAPER: Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Sophos

E-Guide: Avoiding Application Security Pitfalls
sponsored by TechTarget Security
EGUIDE: This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

TechTarget Security

FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER: IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

IBM Point of View: Security and Cloud Computing
sponsored by IBM
WHITE PAPER: Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Provide Access Control With Innovative Solutions From IBM
sponsored by IBM
WHITE PAPER: Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
sponsored by IBM
WHITE PAPER: When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company
sponsored by Oracle Corporation
EBOOK: This e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data.
Posted: 30 Dec 2010 | Published: 30 Dec 2010

Oracle Corporation

Presentation Transcript: What’s New with Rational Application Security?
sponsored by IBM
PRESENTATION TRANSCRIPT: Every day, more and more business is conducted online creating new challenges for meeting web application security and compliance.  This presentation transcript explores an approach that will help your organization address today’s biggest threats.
Posted: 18 Dec 2010 | Published: 18 Dec 2010

IBM

NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
sponsored by NETGEAR Inc.
CASE STUDY: Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.
Posted: 17 Dec 2010 | Published: 17 Dec 2010

NETGEAR Inc.

E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE: If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

NETGEAR Inc.

CIOs and the Cloud
sponsored by Panduit
EBOOK: This e-book examines the confusions surrounding cloud computing. It also gives helpful tips on getting an organization’s IT house in order by ensuring quality and cost-effective delivery of services. Continue reading this e-book for more information on CIOs and the cloud.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Panduit

IP Networking and Its Impact on Video Surveillance
sponsored by NETGEAR Inc.
WHITE PAPER: Video surveillance is critical for business. Different organizations use video surveillance to protect people’s safety, protect valuable assets, or minimize risks associated with criminal activity. One of the biggest trends in surveillance is the accelerating shift to IP from analog. Read this white paper to learn more.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

NETGEAR Inc.