In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER:
This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER:
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008
|
|
|
Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER:
Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010
|
|
|
Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER:
Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011
|
|
|
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER:
As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013
|
|
|
Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER:
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011
|
|
|
Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER:
A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017
|
|
|
Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER:
This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
|
|
|
HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER:
In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013
|
|
|
Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER:
The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010
|
|
|
Mobile Device Security Overview
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011
|
|
|
SecurityServer – Secure Your Organization’s Most Valuable Assets
sponsored by Utimaco
PRODUCT OVERVIEW:
As organizations continue to evolve digitally, the volume of sensitive keys, identities, and data is increasing. Utimaco SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance. Read on to learn more.
Posted: 01 Jun 2023 | Published: 01 Jun 2023
|
|
|
Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT:
This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013
|
|
|
Presentation Transcript: ISACA PCI Compliance Symposium
sponsored by Intel
PRESENTATION TRANSCRIPT:
Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
Posted: 19 May 2011 | Published: 19 May 2011
|
|
|
Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012
|
|
|
Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE:
Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017
|
|
|
The Keys to Scaling Digital Value
sponsored by Google Cloud
ANALYST REPORT:
How does your digital transformation strategy stack up against leaders around the world? Explore insights from this global report.
Posted: 25 Mar 2022 | Published: 25 Mar 2022
|
|
|
The Processor Problem: One Size Doesn't Fit
sponsored by TechTarget Data Center
EBOOK:
This expert e-book examines at purpose-built processors and discusses how, when used strategically, they can enhance performance with less energy than the traditional x86 approach.
Posted: 05 Aug 2014 | Published: 05 Aug 2014
|
|
|
Care Providers Ascend to Cloud for Medical Imaging Needs
sponsored by TechTarget Health IT
EBOOK:
For healthcare providers considering shifting the storage of their patients' images into cloud environments, there are a lot of options. This handbook explores why providers are turning to the cloud and how that trend PACS and VNAs.
Posted: 06 Apr 2016 | Published: 06 Apr 2016
|
|
|
The Problem with the Padlock
sponsored by TechTarget Security
EBOOK:
TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015
|
|
|
Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE:
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009
|
|
|
Next Generation Network Management Techniques
sponsored by TechTarget Security
EZINE:
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012
|
|
|
Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE:
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009
|
|
|
Next Generation Network Management Techniques
sponsored by TechTarget Networking
EZINE:
As network strategies continue to change, new tools and techniques are giving IT organizations better visibility and control over their networks. This expert guide will inform you on new networking trends and strategies, whether that is 40gigabit ethernet or data center networking.
Posted: 20 Nov 2013 | Published: 29 Feb 2012
|
|
|
CW Nordics – August 2015 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE:
5G technology from Ericsson could soon be used to improve communication and remote control operations in the mines of Sweden. A project designed to improve productivity and safety in traditionally dangerous environments is being run by Ericsson, ABB, Boliden, SICS Swedish ICT and Volvo Construction Equipment.
Posted: 18 Aug 2015 | Published: 18 Aug 2015
|
|
|
Nordics E-Zine UK Demo
sponsored by TechTarget
WHITE PAPER:
Nordics E-Zine UK Demo
Posted: 20 Aug 2015 | Published: 20 Aug 2015
|
|
|
Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 02 Oct 2018 | Published: 02 Oct 2018
|
|
|
Computer Weekly - 10-16 September 2019: A tech boost for social care
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
Posted: 08 Feb 2021 | Published: 10 Sep 2019
|
|
|
Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE:
This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009
|
|