Securing the enterprise application layer: Expert Guidelines
sponsored by TechTarget Security
EGUIDE:
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation. Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011
|
|
|
Compliance and Cloud Security eBook
sponsored by TechTarget Security
EBOOK:
SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.
Posted: 19 Jul 2011 | Published: 19 Jul 2011
|
|
|
Building the Right Mobile Security Toolkit
sponsored by TechTarget Security
EGUIDE:
Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
Posted: 01 Jun 2011 | Published: 01 Jun 2011
|
|
|
Presentation Download: Data Protection Strategies: Data Encryption
sponsored by CDW Healthcare
PRESENTATION TRANSCRIPT:
If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.
Posted: 25 Oct 2011 | Published: 25 Oct 2011
|
|
|
Eguide: Avoiding a patient data breach – and how to handle one if it does occur
sponsored by CDW Healthcare
EGUIDE:
In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.
Posted: 21 Oct 2011 | Published: 21 Oct 2011
|
|
|
The Complete Guide to Backup and Recovery for the SMB
sponsored by Nexsan
WHITE PAPER:
Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.
Posted: 23 Sep 2011 | Published: 23 Sep 2011
|
|
|
Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER:
Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011
|
|
|
Simplifying management and lowering total cost of ownership for SSL certificates
sponsored by GlobalSign
WHITE PAPER:
This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.
Posted: 17 May 2011 | Published: 17 May 2011
|
|
|
IDC Technology Spotlight: Leveraging the Benefits of Cloud Computing with Specialized Security
sponsored by Trend Micro
WHITE PAPER:
There is shift in threat landscape with the emergence of cloud; while offering significant benefits, cloud computing expands the playing field for cybercriminals and increase security demands, IDC Spotlight explores the technology of cloud based security
Posted: 15 May 2011 | Published: 11 May 2011
|
|
|
Magic Quadrant for Mobile Data Protection
sponsored by Sophos
WHITE PAPER:
This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011
|
|
|
Data Privacy e-Book
sponsored by TechTarget ComputerWeekly.com
TECHNICAL ARTICLE:
SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011
|
|
|
Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud
sponsored by Intel
WHITE PAPER:
Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.
Posted: 08 Apr 2011 | Published: 08 Apr 2011
|
|
|
Solution Brief: SAP and Blue Coat
sponsored by BlueCoat
WHITE PAPER:
Blue Coat’s WAN Optimization technology is especially well suited to improving response times and reducing bandwidth consumption for SAP users, by prioritizing SAP applications and guaranteeing performance over non-critical or recreational traffic.
Posted: 08 Apr 2011 | Published: 07 Apr 2011
|
|
|
Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO:
Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011
|
|
|
Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO:
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011
|
|
|
How Can You Prepare for the Consumerization of IT
sponsored by DynTek & McAfee
WHITE PAPER:
The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
|
|
|
2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER:
This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010
|
|
|
The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST:
In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more.
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010
|
|
|
E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by TechTarget Security
EBOOK:
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010
|
|
|
PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by TechTarget Security
EBOOK:
SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010
|
|
|
Cloud-Stored Offsite Database Backups
sponsored by Oracle Corporation
WHITE PAPER:
Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.
Posted: 06 Oct 2010 | Published: 17 May 2010
|
|
|
Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER:
This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010
|
|
|
KineticD Security
sponsored by KineticD
WHITE PAPER:
The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010
|
|
|
Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE:
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010
|
|
|
Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER:
Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010
|
|