E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE:
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011
|
|
|
Buyer's Guide to Antimalware
sponsored by TechTarget Security
EGUIDE:
Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011
|
|
|
E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE:
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010
|
|
|
Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD:
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011
|
|
|
Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD:
Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011
|
|
|
Self-Management of Passwords (SMOP) Version 1.1
sponsored by turbo-IT Corporation
SOFTWARE DEMO:
Active Directory users often have their accounts locked out or forget their passwords. This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs.
Posted: 17 May 2011 | Premiered: 17 May 2011
|
|
|
Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER:
As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011
|
|
|
Securing Virtualised DataCentres
sponsored by Trend Micro
EBOOK:
Access this e-book to gain insight on securing a virtualised environment. Discover how to tackle virtualisation security issues and set the foundation to move confidently to the cloud.
Posted: 15 May 2011 | Published: 11 May 2011
|
|
|
Protect sensitive data with multiple layers of loss protection
sponsored by CDW Healthcare
WHITE PAPER:
This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.
Posted: 13 Apr 2011 | Published: 12 Apr 2011
|
|
|
Top Ten IT Systems Management Pain Points
sponsored by Kaseya
WHITE PAPER:
Managing the IT infrastructure for small and mid-sizedcompanies is a thankless job. People just don’tunderstand the expertise, time and patience required.Kaseya presents the top ten IT management pain pointsand our solution for making your life easier.
Posted: 12 Apr 2011 | Published: 12 Apr 2011
|
|
|
InfoSphere Warehouse 9.7 data sheet
sponsored by IBM
DATA SHEET:
Access to timely, accurate information is critical as enterprises strive to boost competitiveness and innovation.
Posted: 18 Mar 2011 | Published: 18 Mar 2011
|
|
|
GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER:
This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011
|
|
|
Protect sensitive data with multiple layers of loss protection
sponsored by CDW Healthcare
WHITE PAPER:
This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.
Posted: 04 Mar 2011 | Published: 04 Mar 2011
|
|
|
IT Decision Checklist: Virtual Desktop Infrastructure Security
sponsored by Astaro
EGUIDE:
VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.
Posted: 15 Feb 2011 | Published: 15 Feb 2011
|
|
|
A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER:
In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
|
|
|
Windows Azure Platform Security Essentials: Module 1 - Security Architecture
sponsored by Microsoft
WEBCAST:
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
Posted: 16 Dec 2010 | Premiered: Dec 16, 2010
|
|
|
E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE:
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010
|
|
|
Application Security Assessment Options
sponsored by Security Innovation
EGUIDE:
This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems.
Posted: 03 Dec 2010 | Published: 03 Dec 2010
|
|
|
IT Decision Checklist: Virtual Desktop Infrastructure Security
sponsored by Trend Micro
EGUIDE:
Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.
Posted: 02 Nov 2010 | Published: 02 Nov 2010
|
|
|
eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK:
Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010
|
|
|
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER:
This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010
|
|
|
Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER:
Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010
|
|
|
Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER:
This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010
|
|
|
Data Leak Protection Planning
sponsored by (ISC)2 UK Ltd
EBOOK:
It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.
Posted: 23 Sep 2010 | Published: 23 Sep 2010
|
|
|
10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER:
This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013
|
|