Practical Steps to Achieve and Maintain NERC Compliance
sponsored by Tripwire, Inc.
WHITE PAPER:
This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.
Posted: 31 Jul 2009 | Published: 08 Dec 2008
|
|
|
Managing Your Data Assets
sponsored by Pitney Bowes Business Insight
WHITE PAPER:
Information management is integral to successfully maintaining a competitive advantage. The value of all your data can increase or decrease over time depending on how you manage it. Read on to learn how to gain the insights into information management you need to succeed and gain that competitive edge that is now more important than ever.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Entitlement Reviews: A Practitioner's Guide
sponsored by Varonis
WHITE PAPER:
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER:
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Protecting SharePoint Data Long Term
sponsored by Varonis
WHITE PAPER:
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO:
Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009
|
|
|
Technology & Business from Sun and AMD
sponsored by Sun Microsystems, Inc.
EZINE:
Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...
Posted: 20 Jul 2009 | Published: 20 Jul 2009
|
|
|
Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS:
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009
|
|
|
eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK:
Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009
|
|
|
Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
sponsored by Dell Software
WEBCAST:
This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
Posted: 29 Jun 2009 | Premiered: Jun 26, 2009
|
|
|
Presentation Transcript: Endpoint security fundamentals
sponsored by Sophos
PRESENTATION TRANSCRIPT:
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
Posted: 25 Jun 2009 | Published: 25 Jun 2009
|
|
|
The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK:
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009
|
|
|
Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE:
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009
|
|
|
5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
sponsored by Symantec Corporation
WHITE PAPER:
Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
Posted: 11 Jun 2009 | Published: 11 Jun 2009
|
|
|
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE:
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009
|
|
|
Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER:
Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
VMware Solutions for Small and Midsize Businesses: The Most Cost-Effective Way to Enable Always On IT
sponsored by Dell and VMware
WHITE PAPER:
Check out this solution brief to discover how VMware equips SMBs with technology solutions that allow them to cost effectively optimize the use of their existing IT assets and resources as well as protect the systems, data, and applications that run the business, ensuring Always On IT.
Posted: 01 Jun 2009 | Published: 01 May 2009
|
|
|
eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE:
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009
|
|
|
Presentation Transcript: Changing the Economics of Storage Infrastructure with Virtualization
sponsored by LSI and presented by HP
PRESENTATION TRANSCRIPT:
In these hard economic times, so much information is already out there about how to bring down the costs of storage infrastructures, but none of them describe how the design of a flexible and agile (adaptive) infrastructure actually facilitates these potential savings.
Posted: 29 May 2009 | Published: 15 May 2009
|
|
|
The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT:
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009
|
|
|
Integrating Virtualized Servers with VMware vStorage-Enabled Dell EqualLogic iSCSI SANs
sponsored by Dell and VMware
WHITE PAPER:
Dell EqualLogic Auto- Snapshot Manager / VMware Edition enables administrators to quickly and easily create hypervisor-aware snapshots of VMs-helping simplify data management, enhance scalability of data protection and recovery, and increase application performance.
Posted: 14 May 2009 | Published: 01 Nov 2008
|
|
|
Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos
ANALYST REPORT:
Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
Posted: 12 May 2009 | Published: 12 May 2009
|
|
|
eBook: A Holistic Approach to Data Protection
sponsored by TechTarget CIO
EBOOK:
In this eBook the SearchCIO.com team discusses how Data Protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue.
Posted: 22 Apr 2009 | Published: 22 Apr 2009
|
|
|
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
sponsored by Information Security Magazine
EZINE:
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
Posted: 20 Apr 2009 | Published: 20 Apr 2009
|
|
|
WAN Acceleration and Optimization: Frequently Asked Questions
sponsored by Riverbed Technology, Inc.
PRESENTATION TRANSCRIPT:
In this podcast, Jeff Boles, Senior Analyst with the Taneja Group, outlines the significance of WAN optimization in the disaster recovery (DR) space.
Posted: 16 Apr 2009 | Published: 16 Apr 2009
|
|