Search Results for: Property-

Security Appliances: New Strides in Preventing Intrusions
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.

IBM

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.

Symantec Corporation

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

Juniper Networks, Inc.

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.

IBM

Make Your Data More Valuable With Real-Time Analytics
Location, location, location. True for property value, and for data value. Make an impact with enhanced enterprise data.

IBM

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.

Symantec Corporation

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.

Symantec Corporation

E-Guide: Monitoring Strategies for Insider Threat Detection
In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

IBM

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now.

TechTarget ComputerWeekly.com

E-Book: Strategic guide to insider threat detection and breach response
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.

TechTarget Security