Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 04 Aug 2016 | Published: 04 Aug 2016
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016
|
|
|
Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE:
In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016
|
|
|
A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016
|
|
|
Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE:
In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014
|
|
|
Data Loss Prevention: Decision Time
sponsored by TechTarget Security
EBOOK:
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
|
|
|
Data Loss Prevention: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK:
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
|
|
|
Data Loss Prevention: From Business Problem to Technical Solution
sponsored by TechTarget Security
EBOOK:
This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014
|
|
|
Kicking off an e-health revolution
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014
|
|
|
What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET:
This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014
|
|
|
Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER:
This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014
|
|
|
Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER:
This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014
|
|
|
A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER:
This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012
|
|
|
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER:
This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014
|
|
|
Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014
|
|
|
6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER:
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014
|
|
|
Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER:
This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011
|
|
|
Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014
|
|
|
Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
WHITE PAPER:
This data sheet highlights the benefits of a backup solution for built for laptops and desktops.
Posted: 24 Feb 2014 | Published: 31 Mar 2013
|
|
|
A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER:
In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013
|
|
|
In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER:
This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
|
|
|
Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER:
In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013
|
|
|
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER:
As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013
|
|
|
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER:
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013
|
|
|
Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER:
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012
|
|