Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023
|
|
|
Implementing a Zero-Trust Approach to Network Security
sponsored by Informa TechTarget
RESOURCE:
Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 04 Oct 2021 | Published: 04 Feb 2020
|
|
|
Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023
|
|
|
IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 08 Feb 2021 | Published: 16 Nov 2020
|
|
|
Making Sense of Zero-Trust Security
sponsored by Informa TechTarget
RESOURCE:
As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 26 Mar 2021 | Published: 01 May 2021
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|
|
Password Security Guidelines
sponsored by Informa TechTarget
RESOURCE:
In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019
|
|
|
EMBASSY Remote Administration Server (ERAS)
sponsored by Wave Systems Corp.
PRODUCT OVERVIEW:
Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives.
Posted: 20 Feb 2008 | Published: 01 Feb 2008
|
|
|
EMC Documentum Information Rights Management
sponsored by EMC Corporation
WHITE PAPER:
This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients.
Posted: 05 May 2008 | Published: 12 Dec 2006
|
|
|
Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER:
This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005
|
|
|
Facilitating Enterprise PCI DSS Compliance - Executive Summary
sponsored by Globalscape
WHITE PAPER:
The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
Posted: 16 Apr 2008 | Published: 15 Apr 2008
|
|
|
Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER:
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Get Ready for Master Data Management: Ten Things You Can Do Now
sponsored by Kalido
WHITE PAPER:
This paper explians in detail ten things you can do now to prepare for your master data management initiative.
Posted: 27 Oct 2008 | Published: 27 Oct 2008
|
|
|
IBM Optim Data Privacy Solution for SAP
sponsored by IBM
PRODUCT LITERATURE:
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.
Posted: 29 Oct 2008 | Published: 29 Oct 2008
|
|
|
IFS Enterprise Asset Management - EAM/CMMS
sponsored by IFS
SERVICE LISTING:
IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit.
Posted: 15 Feb 2008 | Published: 15 Feb 2008
|
|
|
Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER:
This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008
|
|
|
Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006
|
|
|
Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER:
This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008
|
|
|
Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER:
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|
|
Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER:
Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005
|
|
|
Parkview Adventist Medical Center Clinicians Get Security at Their Fingertips with Imprivata
sponsored by Imprivata
CASE STUDY:
By incorporating finger biometric scanning into the solution, Parkview would enable each doctor or nurse to log on to any PC at the facility with a single fingertip swipe.
Posted: 24 Jan 2008 | Published: 01 Jan 2007
|
|
|
Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER:
When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007
|
|
|
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER:
This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006
|
|