Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER:
Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008
|
|
|
Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST:
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)
|
|
|
Readers' Choice Awards
sponsored by Information Security Magazine
JOURNAL ARTICLE:
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
Posted: 13 Apr 2008 | Published: 01 Apr 2008
|
|
|
Automating Group Policy Management
sponsored by SDM Software
WHITE PAPER:
Group policy objects (GPOs) are used to secure and lockdown your Windows environment. Learn how you can ensure that GPOs are available, manageable and automated.
Posted: 03 Mar 2008 | Published: 27 Feb 2008
|
All resources sponsored by SDM Software
|
|
Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER:
When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007
|
|
|
Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER:
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008
|
|
|
Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER:
This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008
|
|
|
IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER:
This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007
|
|
|
Potomac Hospital Case Study
sponsored by SonicWALL
CASE STUDY:
In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
Posted: 15 Nov 2007 | Published: 01 Jun 2007
|
|
|
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER:
SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007
|
|
|
Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER:
Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007
|
|
|
Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER:
Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007
|
|
|
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY:
This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006
|
|
|
Intel vPro Technology Launch Video
sponsored by Intel Corporation
WEBCAST:
Business Desktop PCs with Intel vPro technology provide down-the-wire proactive security and manageability capabilities for your every business needs'-even when the user's environment is inoperable.
Posted: 02 Oct 2006 | Premiered: Oct 2, 2006
|
|
|
Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER:
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006
|
|
|
Built-in Manageability and Proactive Security for Business Desktop PCs
sponsored by Intel Corporation
WHITE PAPER:
Read this white paper to learn how built in desktop management can help address today?s key IT challenges such as avoiding malicious attacks, accurate inventory of assets, and the demand for IT services.
Posted: 05 Sep 2006 | Published: 01 Oct 2006
|
|
|
Sophos Email Security Appliances
sponsored by Sophos
PRODUCT DEMO:
The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006
|
|