Modernizing Security: Proactive PAM Solutions for Today
sponsored by One Identity
WHITE PAPER:
In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.
Posted: 12 Jun 2024 | Published: 12 Jun 2024
|
|
|
Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020
|
|
|
Cisco IT GRC Security Assessment Service
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
Posted: 15 Jun 2009 | Published: 12 Jun 2009
|
|
|
Integrating Dell Equallogic™ Sans with Citrix XENSERVER: Realizing Virtualization's Full Potential
sponsored by DellEMC and Intel®
WHITE PAPER:
XenServer enables consolidation of server and other infrastructure resources, by combining servers and storage into resource pools that can be apportioned to the applications with the highest business need.
Posted: 10 Nov 2008 | Published: 10 Nov 2008
|
|
|
Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem
sponsored by NEC Corporation of America
WHITE PAPER:
Data de-duplication has recently gained significant industry attention, especially for disk-based backup products.
Posted: 07 Jan 2008 | Published: 01 Jan 2007
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
REMOTE CONTROL: How to Reduce the Cost, Complexity and Risk of Managing Your Distributed IT Infrastructure
sponsored by Uplogix
WHITE PAPER:
This white paper outlines the requirements of managing a highly distributed IT environment and examines how new secure remote management solutions can drastically reduce the cost, complexity and risk of managing remote locations.
Posted: 18 Apr 2008 | Published: 01 Apr 2008
|
|
|
Jumping on the Cloud-Wagon? AppZero's Virtual Application Appliance Approach
sponsored by AppZero
WHITE PAPER:
This paper explains the attributes of AppZero's VAA approach to server-side application virtualization and conveys various advantages in the cloud environment.
Posted: 04 Mar 2009 | Published: 04 Mar 2009
|
|
|
Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER:
This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
HP Integrity Systems: Family Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 16 Oct 2008 | Published: 16 Oct 2008
|
|