Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008
|
|
|
Network Security Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
Network Security for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
Defining Your Corporate Mobile Policies
sponsored by TechTarget Security
EGUIDE:
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008
|
|
|
Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It
sponsored by Bloxx, Inc.
WHITE PAPER:
The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.
Posted: 09 Sep 2008 | Published: 09 Sep 2008
|
|
|
The "Hard Truths" About Managing Administrative and Application Identities
sponsored by CyberArk Software, Inc
VIDEOCAST:
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)
|
|
|
Network Security Checklist
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE:
Every SMB should have a written (and thoughtfully prepared) network-security plan in place.
Posted: 10 Jul 2008 | Published: 01 Jan 2005
|
|
|
Cisco Catalyst 2950 Series Intelligent Ethernet Switches for Metro Access
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING:
The Cisco Catalyst® 2950 Series Intelligent Ethernet switches is an affordable line of fixed-configuration Fast Ethernet and Gigabit Ethernet switches that extend intelligence to the metro access edge.
Posted: 10 Jul 2008 | Published: 01 Jan 2002
|
|
|
z Cisco Catalyst 2950 Series Switches with Standard Image SW
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING:
The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features.
Posted: 10 Jul 2008 | Published: 01 Jan 2004
|
|
|
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER:
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006
|
|
|
Symantec Internet Security Threat Report: Trends for July-December 07
sponsored by Symantec Corporation
WHITE PAPER:
This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Posted: 18 Jun 2008 | Published: 01 Apr 2008
|
|
|
QuickTour Demo: Key Differentiators between MicroStrategy and Cognos
sponsored by MicroStrategy
WEBCAST:
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Cognos.
Posted: 09 Jun 2008 | Premiered: Jun 7, 2008
|
|
|
Implementing a "Smart IPS": IANS Working Knowledge Series
sponsored by Sourcefire
CASE STUDY:
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
Posted: 09 Jun 2008 | Published: 01 Jun 2008
|
|
|
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008
|
|
|
Meeting the Payment Card Industry Data Security Standard
sponsored by Prism Microsystems Inc.
WHITE PAPER:
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.
Posted: 30 May 2008 | Published: 08 Apr 2008
|
|
|
EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
sponsored by Qualys, Inc.
CASE STUDY:
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
Posted: 10 May 2008 | Published: 10 May 2008
|
|
|
Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER:
Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008
|
|
|
Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST:
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)
|
|
|
Symantec Protection Network and Online Backup: An Executive Overview
sponsored by Symantec Corporation
PODCAST:
In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.
Posted: 29 Feb 2008 | Premiered: Feb 19, 2008
|
|
|
Cisco ASA 5500 Series Business Edition Solution
sponsored by Cisco Systems, Inc.
HARDWARE LISTING:
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected.
Posted: 28 Feb 2008 | Published: 01 Jan 2007
|
|
|
Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006
|
|
|
Niksun NetDetector Data Sheet
sponsored by NIKSUN
HARDWARE LISTING:
NetDetector seamlessly integrates with other NIKSUN products, 3rd-party applications and network devices to provide a rock-solid security solution.
Posted: 30 Jan 2008 | Published: 01 Jan 2005
|
|
|
SolarWinds ipMonitor v9.0
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE:
ipMonitor delivers out-of-the-box availability monitoring that is ideal for environments with less than 500 devices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008
|
|
|
A Layered Approach to Securing Remote Maintenance Consoles
sponsored by Raritan Inc.
WHITE PAPER:
Existing techniques for accessing maintenance consoles are inefficient and leave security holes in the network. Learn how, by deploying a secure console server, maintenance consoles can be secured and the availability of the network improved.
Posted: 18 Jan 2008 | Published: 01 Jan 2007
|
|