BYOD Security Strategies: Balancing BYOD Risks and Rewards
sponsored by TechTarget Security
EGUIDE:
This expert guide takes an in-depth look at BYOD security strategies, outlining what crucial factors you need to keep in mind and how you can ensure a successful and secure BYOD initiative.
Posted: 23 Sep 2013 | Published: 23 Sep 2013
|
|
|
IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER:
In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013
|
|
|
As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER:
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012
|
|
|
Security University: Cloud Security
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT:
Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013
|
|
|
Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER:
In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013
|
|
|
Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.
Posted: 18 Oct 2013 | Published: 18 Oct 2013
|
|
|
6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
WEBCAST:
In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013
|
|
|
Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER:
Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013
|
|
|
Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
sponsored by IBM
WHITE PAPER:
This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.
Posted: 16 Oct 2013 | Published: 16 Oct 2013
|
|
|
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER:
In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009
|
|
|
Three Ways to Prevent USB Insecurity
sponsored by Lumension
WHITE PAPER:
This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Posted: 14 Oct 2013 | Published: 14 Oct 2013
|
|
|
Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER:
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013
|
|
|
PCI DSS Simplified: What You Need to Know
sponsored by AT&T Cybersecurity
WEBCAST:
Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013
|
|
|
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER:
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013
|
|
|
CORE Security and the Payment Card Industry Data Security Standard
sponsored by Core Security Technologies
WHITE PAPER:
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.
Posted: 09 Oct 2013 | Published: 09 Oct 2013
|
|
|
Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE:
When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013
|
|
|
Enterprise Security Checklist
sponsored by Code42
WEBCAST:
This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)
|
|
|
Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER:
Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013
|
|
|
Crafting a Secure Approach to Mobility and Compliance
sponsored by TechTarget Mobile Computing
EBOOK:
This expert resource discusses key security features that need to be addressed when creating an effective mobile strategy, including how you can ensure compliance. Read on and learn about crucial topics such as encryption, data protection, and mobile application management.
Posted: 25 Sep 2013 | Published: 25 Sep 2013
|
|
|
Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012
|
|
|
Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012
|
|
|
The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013
|
|
|
Keep Cloud Compliant
sponsored by TechTarget Security
EBOOK:
Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013
|
|
|
The Mobile Trust Gap
sponsored by MobileIron
WHITE PAPER:
This important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
Posted: 16 Sep 2013 | Published: 16 Sep 2013
|
|
|
Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER:
This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|
|