Unprotected Laptops: The Million Dollar Gamble: How Much Can Your Company Afford to Lose?
sponsored by Dell, Inc. and Intel®
WHITE PAPER:
Read this white paper to learn more about laptop security and how asset and data protection solutions from Dell can help save your company millions of dollars.
Posted: 27 Jan 2009 | Published: 27 Jan 2009
|
|
|
Fast, Reliable Data Protection from Dell and CommVault
sponsored by DellEMC and Intel®
TECHNICAL ARTICLE:
The new state-of-the-art Dell PowerVault DL2000 integrates disk-based backup and recovery with de-duplication technology to help deliver fast, reliable data protection.
Posted: 26 Jan 2009 | Published: 26 Jan 2009
|
|
|
Simplified Data Protection with Disk-Based Backup from Dell and Symantec
sponsored by DellEMC and Intel®
TECHNICAL ARTICLE:
The new Dell PowerVault DL2000 helps organizations of all sizes deploy simplified, cost-effective data protection--helping accelerate backup and recovery, enhance media reliability and reduce total cost of ownership.
Posted: 26 Jan 2009 | Published: 26 Jan 2009
|
|
|
Total Cost Comparison of Backup Technologies: IT Decision-Maker Perspectives on NetApp SnapVault Disk-to-Disk versus Traditional Tape-Based Backup Solutions
sponsored by NetApp
WHITE PAPER:
Download this exclusive article to gain insight on why a NetApp SnapVault backup system is 54% less expensive than a similar tape-based backup solution over a typical backup product lifecycle.
Posted: 09 Jan 2009 | Published: 09 Jan 2009
|
|
|
Dell ProSupport Laptop Tracking and Recovery
sponsored by DellEMC and Intel®
DATA SHEET:
The Dell ProSupport Laptop Tracking and Recovery Service helps protect your data by enabling you to track your mobile systems in the event a system is lost or stolen.
Posted: 09 Jan 2009 | Published: 09 Jan 2009
|
|
|
Dell ProSupport Certified Data Destruction
sponsored by DellEMC and Intel®
DATA SHEET:
The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
Posted: 09 Jan 2009 | Published: 09 Jan 2009
|
|
|
Keep Your Hard Drive
sponsored by DellEMC and Intel®
DATA SHEET:
The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives.
Posted: 09 Jan 2009 | Published: 09 Jan 2009
|
|
|
Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT:
This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009
|
|
|
IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO:
IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008
|
|
|
Enabling Sustainable Compliance Management
sponsored by IBM
WHITE PAPER:
Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
Posted: 22 Dec 2008 | Published: 19 Dec 2008
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER:
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008
|
|
|
Take a Holistic Approach to Business Driven Security
sponsored by IBM
WHITE PAPER:
Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.
Posted: 22 Dec 2008 | Published: 19 Dec 2008
|
|
|
eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK:
Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008
|
|
|
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008
|
|
|
Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER:
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008
|
|
|
HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008
|
|
|
Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER:
This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008
|
|
|
Ethical Hacking and Risk Assessments
sponsored by Global Knowledge
WEBCAST:
Attend this webcast to learn about risk assessment process and tools used by ethical hackers.
Posted: 10 Dec 2008 | Premiered: Dec 10, 2008
|
|
|
Agentless Application Virtualization: Enabling the Evolution of the Desktop
sponsored by VMware, Inc.
WHITE PAPER:
In this study, IDC analyst Michael Rose discusses how VMware ThinApp, an agentless virtualization solution, addresses the challenges of desktop computing. Read this paper to learn about the pros and cons of virtualized client computing.
Posted: 10 Dec 2008 | Published: 11 Dec 2008
|
|
|
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by TechTarget Mobile Computing
EBOOK:
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER:
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER:
This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008
|
|
|
IBM Optim Data Privacy Solution for SAP
sponsored by IBM
PRODUCT LITERATURE:
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.
Posted: 29 Oct 2008 | Published: 29 Oct 2008
|
|
|
Solving the Distributed Data Problem
sponsored by IBM
WHITE PAPER:
Companies need to reevaluate traditional methods of protecting branch office and PC data such as tape backups and other localized do-it-yourself solutions. Read this white paper to learn about remote on-demand services.
Posted: 27 Oct 2008 | Published: 27 Oct 2008
|
|
|
Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST:
Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)
|
|