The Future of Address Validation: Going Beyond Move Update to Cut Costs and Connect with Customers
sponsored by Pitney Bowes Business Insight
WHITE PAPER:
Today, the need to connect with customers efficiently and effectively is more important than ever. The foundation of these communications is a complete and accurate customer record. This paper describes the validation requirements, opportunities and best practices to increase organizational efficiencies relative to enterprise address validation.
Posted: 13 Sep 2010 | Published: 13 Sep 2010
|
|
|
Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER:
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010
|
|
|
Risk Never Sleeps: Managing Risk in an Uncertain World
sponsored by SunGard Availability Services
WHITE PAPER:
IT professionals are increasingly responsible for doing more than just provisioning servers and maintaining applications – they are core players in the risk management process. Read this whitepaper to learn more.
Posted: 19 Aug 2010 | Published: 19 Aug 2010
|
|
|
Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER:
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010
|
|
|
E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
sponsored by Mimecast
DATA SHEET:
Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010
|
|
|
How the Guardium Platform Helped Dell IT Simplify Enterprise Security
sponsored by Guardium, an IBM Company
WHITE PAPER:
Safeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
Posted: 10 Aug 2010 | Published: 10 Aug 2010
|
|
|
Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER:
Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 28 Jul 2010 | Published: 28 Jul 2010
|
|
|
Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
sponsored by Dell Software
WHITE PAPER:
Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.
Posted: 26 Jul 2010 | Published: 26 Jul 2010
|
|
|
Rebuilding the Banking Landscape: Restoring Customer Confidence and Returning to Growth
sponsored by Micro Focus, Ltd
WHITE PAPER:
This paper looks at the ways that banks are having to adapt to rise to these challenges, the constraints they face and how innovative changes in IT infrastructure can release time, money and capacity to meet the demands of the new banking landscape.
Posted: 22 Jul 2010 | Published: 22 Jul 2010
|
|
|
When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER:
Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010
|
|
|
E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE:
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010
|
|
|
The State of Privacy and Data Security Compliance
sponsored by Sophos
ANALYST REPORT:
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.
Posted: 25 Jun 2010 | Published: 30 Nov 2009
|
|
|
Securing Virtualised Environments and Accelerating Cloud Computing
sponsored by CA Technologies
WHITE PAPER:
There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
Posted: 01 Jun 2010 | Published: 01 May 2010
|
|
|
Global Trends in Sustainability Performance Management
sponsored by SAP America, Inc.
WHITE PAPER:
This paper will present an overview of the changing landscape as companies develop practices and processes to measure their performance as sustainable enterprises. It will examine the complex new drivers of sustainability reporting, as well as the rapidly changing legislative environment that will make reporting mandatory, not voluntary.
Posted: 01 Jun 2010 | Published: 01 Jun 2010
|
|
|
Why Should Companies Take a Closer Look at Business Continuity Planning?
sponsored by Datalink
WHITE PAPER:
Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise.
Posted: 27 May 2010 | Published: 26 May 2010
|
|
|
Solving Four Primary Security Challenges of Microsoft SharePoint
sponsored by Sophos UK
WHITE PAPER:
This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Posted: 25 May 2010 | Published: 01 Nov 2009
|
|
|
Scaling Scrum: Lessons from the Trenches
sponsored by IBM
WEBCAST:
Check out this webcast to learn how the Agile Scaling Model can be applied to tailor the Scrum lifecycle, roles, and practices to address scaling factors, including regulatory compliance, technical complexity, and organizational complexity.
Posted: 24 May 2010 | Premiered: May 24, 2010
|
|
|
PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE:
High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010
|
|
|
A Virtualization Roadmap from Dell and Intel
sponsored by DellEMC and Intel®
WHITE PAPER:
Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations normally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance.
Posted: 29 Apr 2010 | Published: 29 Apr 2010
|
|
|
Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER:
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
Posted: 14 Apr 2010 | Published: 14 Apr 2010
|
|
|
Log Management Best Practices
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT:
In this presentation transcript, find out best practices in log management and how it affects the use of security dashboards. Also learn how log management differs from security information and event management (SIEM).
Posted: 14 Apr 2010 | Published: 14 Apr 2010
|
|
|
Pulling the Plug on Legacy Log Management
sponsored by Tripwire, Inc.
ANALYST BRIEF:
When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.
Posted: 09 Apr 2010 | Published: 09 Apr 2010
|
|
|
Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy
sponsored by Sherpa Software
PRESENTATION TRANSCRIPT:
This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.
Posted: 25 Mar 2010 | Published: 25 Mar 2010
|
|
|
Secure File Transfer Solution Saves Bank Time and Money
sponsored by Linoma Software
CASE STUDY:
Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
Posted: 24 Mar 2010 | Published: 24 Mar 2010
|
|
|
Presentation Transcript: College of Virtualization - Lessons in Creating a Virtual Infrastructure for Cloud Computing
sponsored by Dell and VMware
PRESENTATION TRANSCRIPT:
This presentation transcript discusses the steps essential for creating a virtual infrastructure for cloud computing to improve the delivery of data center applications.
Posted: 22 Mar 2010 | Published: 05 Mar 2010
|
|