How to Thwart Privilege Creep with Access Reviews
sponsored by TechTarget Security
EGUIDE:
In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013
|
|
|
New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
Posted: 26 Mar 2013 | Published: 26 Mar 2013
|
|
|
Aligning Enterprise Identity and Access Management with CIO Priorities
sponsored by TechTarget Security
EGUIDE:
In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.
Posted: 25 Mar 2013 | Published: 25 Mar 2013
|
|
|
Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013
|
|
|
Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE:
In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013
|
|
|
Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by TechTarget Security
EGUIDE:
Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013
|
|
|
BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by TechTarget Security
EGUIDE:
BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013
|
|
|
Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by TechTarget Security
EGUIDE:
In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013
|
|
|
WLAN Planning For BYOD
sponsored by TechTarget Security
EGUIDE:
This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013
|
|
|
Updating Your Corporate BYOD Program for Success
sponsored by TechTarget Security
EGUIDE:
This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012
|
|
|
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK:
BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012
|
|
|
Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by TechTarget Security
EGUIDE:
Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012
|
|
|
October Essentials Guide on Mobile Device Security
sponsored by TechTarget Security
ESSENTIAL GUIDE:
The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012
|
|
|
Guide to Mobile Device Management Software
sponsored by TechTarget Security
EGUIDE:
This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012
|
|
|
Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER:
As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012
|
|
|
Information Security Magazine - April 2013
sponsored by TechTarget Security
EZINE:
This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013
|
|
|
Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE:
This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013
|
|
|
DNS Firewalls and Defense Tactics
sponsored by Infoblox
EGUIDE:
Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
Posted: 18 Feb 2013 | Published: 18 Feb 2013
|
|
|
Application Delivery and Optimization Solutions Spotlight- Checklist #1
sponsored by TechTarget Networking
EBOOK:
In the first of SearchEnterpriseWAN.com's three-part guide on selecting application delivery optimization (ADO) solutions, get help assessing the business and technology issues surrounding these products and uncover the benefits they can bring your organization.
Posted: 08 Feb 2013 | Published: 08 Feb 2013
|
|
|
Security in Cloud Computing
sponsored by CSC
EGUIDE:
This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs.
Posted: 25 Jan 2013 | Published: 25 Jan 2013
|
|
|
Cloud Costs and Management Considerations
sponsored by CSC
EGUIDE:
This expert E-Guide provides considerations you should keep in mind when moving to the cloud – especially when it comes to security and risk tolerance – and offers expert advice on how to foster cloud adoption in your enterprise.
Posted: 24 Jan 2013 | Published: 24 Jan 2013
|
|
|
Mobile NFC in Transport
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012
|
|
|
Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER:
View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012
|
|
|
Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT:
Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012
|
|
|
Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER:
Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012
|
|