Network Security Reports

Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER: Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

Symantec Corporation

Profiting from PCI Compliance
sponsored by IBM
WHITE PAPER: This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Posted: 13 Mar 2009 | Published: 01 Sep 2007

IBM

Lumension Vulnerability Scanner Offer
sponsored by Lumension
ASSESSMENT TOOL: This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
Posted: 11 Mar 2009 | Published: 11 Mar 2009

Lumension

7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

Migration and Security in SOA
sponsored by Torry Harris Business Solutions
WHITE PAPER: It is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models.
Posted: 03 Mar 2009 | Published: 03 Mar 2009

Torry Harris Business Solutions

Digital Billboard Advertising - New Life for a Classic Medium
sponsored by Motorola Solutions
WHITE PAPER: Read this paper to learn more about the emerging trend of digital billboard advertising and how it can enhance responsiveness, flexibility and profits.
Posted: 02 Mar 2009 | Published: 02 Mar 2009

Motorola Solutions

Enterprise WLAN Infrastructure At-a-Glance
sponsored by Motorola Solutions
PRODUCT LITERATURE: Motorola offers a comprehensive portfolio of wireless LAN (WLAN) infrastructure solutions designed to enable the truly wireless enterprise, regardless of the size of your business. Read this paper to discover how Motorola products provide resiliency, security and performance equal to or greater than that of a wired network.
Posted: 02 Mar 2009 | Published: 02 Mar 2009

Motorola Solutions

Presentation Transcript: Data Masking Essentials for SAP Software
sponsored by IBM
PRESENTATION TRANSCRIPT: In this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

IBM

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

Security Bloopers: Five Common Mistakes
sponsored by Cisco Systems, Inc.
WHITE PAPER: IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Small Business Security: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
sponsored by Bradford Networks
PRESENTATION TRANSCRIPT: Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

Bradford Networks

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.

eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

Information Security Magazine

VMware Enlisted to Serve Marine Corps Enterprise Networking Requirements
sponsored by VMware, Inc.
CASE STUDY: The MCNOSC needed an affordable and easy-to-manage alternate site with real-time data transfer that would be reliable in the event of a catastrophe so they implemented VMware virtual infrastructure which effectively met their requirements.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

VMware, Inc.

Quicktour Demo: Key Differentiators between Microstrategy and Hyperion
sponsored by MicroStrategy
WHITE PAPER: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Hyperion.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

MicroStrategy

Quicktour Demo: Key Differentiators between Microstrategy and Information Builders
sponsored by MicroStrategy
EGUIDE: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Information Builders.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

MicroStrategy

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by TechTarget Security
EBOOK: Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

TechTarget Security

7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER: This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Qualys

Enabling Carrier-class Communications with EX Switches
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.
Posted: 21 Oct 2008 | Published: 21 Oct 2008

Juniper Networks, Inc.

Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST: Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)

Microsoft & Quest Software

The Five Productivity Benefits of a Secure Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.