Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by DellEMC and Intel®
WHITE PAPER:
This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
Posted: 24 Jun 2009 | Published: 24 Jun 2009
|
|
|
Security through Maturity: A Brief on Securing iSCSI Networks
sponsored by DellEMC and Intel®
WHITE PAPER:
Read this white paper to learn about how Internet SCSI (iSCSI) offers a scalable, simplified, and cost-effective way to implement storage area networks (SANs) using Ethernet components.
Posted: 13 May 2009 | Published: 13 May 2009
|
|
|
Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009
|
|
|
Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER:
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Security Bloopers: Five Common Mistakes
sponsored by Cisco Systems, Inc.
WHITE PAPER:
IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Small Business Security: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Take a Holistic Approach to Business Driven Security
sponsored by IBM
WHITE PAPER:
Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.
Posted: 22 Dec 2008 | Published: 19 Dec 2008
|
|
|
Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER:
The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008
|
|
|
Network Security Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
Network Security for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER:
Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
The importance of security assessments
sponsored by IBM
WHITE PAPER:
This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER:
This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007
|
|
|
Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER:
This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007
|
|
|
Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by Forescout Technologies, Inc.
WHITE PAPER:
Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006
|
|
|
Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER:
Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007
|
|