Standards  >  

Security Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Security Protocols Reports
 
PCI in the cloud: Compliance guide
sponsored by SearchSecurity.com
EGUIDE: Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.
Posted: 26 Apr 2012 | Published: 26 Apr 2012

SearchSecurity.com

Security the future: Keeping up with the business
sponsored by ComputerWeekly.com
PRESENTATION: Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

ComputerWeekly.com

MDM for a Secure Mobile Workforce
sponsored by BlackBerry
EGUIDE: This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

BlackBerry

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Is your security as good as the cloud’s?
sponsored by Trend Micro, Inc.
WHITE PAPER: This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.
Posted: 07 Oct 2011 | Published: 04 Oct 2011

Trend Micro, Inc.

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER: The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement