Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
sponsored by Information Security Magazine
EBOOK:
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 08 Apr 2009 | Published: 01 Feb 2009
|
|
|
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009
|
|
|
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009
|
|
|
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK:
This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009
|
|
|
Lumension Vulnerability Scanner Offer
sponsored by Lumension
ASSESSMENT TOOL:
This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
Posted: 11 Mar 2009 | Published: 11 Mar 2009
|
|
|
Hard Hat Area: Myths and Pitfalls of Data Mining
sponsored by SPSS Inc. Worldwide Headquarters
WHITE PAPER:
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte." Myths and misconceptions create their own risks and need to be debunked. This article outlines some risks, debunks some myths, and provides some protective "hard hats" for data miners.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Virtualization Podcasts: Infrastructure Solutions for Midsized Companies
sponsored by IBM
PODCAST:
Midsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.
Posted: 18 Feb 2009 | Premiered: Feb 18, 2009
|
|
|
Ethical Hacking and Risk Assessments
sponsored by Global Knowledge
WEBCAST:
Attend this webcast to learn about risk assessment process and tools used by ethical hackers.
Posted: 10 Dec 2008 | Premiered: Dec 10, 2008
|
|
|
IBM System x Servers - The Right Choice. Open. Easy. Green
sponsored by IBM
WHITE PAPER:
IBMSystemx is a portfolio of robust servers built on IBMX-Architecture's our blueprint for bringing innovation tox86systems. Innovation that helps set you apart from the competition. Learn more in this paper.
Posted: 11 Sep 2008 | Published: 11 Sep 2008
|
|
|
Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks
sponsored by EMC Corporation
WHITE PAPER:
Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.
Posted: 21 Aug 2008 | Published: 15 Aug 2008
|
|
|
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Software
WHITE PAPER:
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008
|
|
|
Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk
sponsored by IBM Line of Business
WHITE PAPER:
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price.
Posted: 12 Jun 2008 | Published: 01 Apr 2007
|
|
|
3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008
|
|
|
A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER:
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007
|
|
|
Vulnerability Management for GLBA Compliance
sponsored by Qualys, Inc.
PRODUCT LITERATURE:
The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines.
Posted: 10 May 2008 | Published: 01 Feb 2007
|
|
|
Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER:
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
Posted: 25 Apr 2008 | Published: 01 Apr 2008
|
|
|
Best Practices in Data Management
sponsored by SAS
WHITE PAPER:
The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM.
Posted: 06 Mar 2008 | Published: 01 Jan 2007
|
|
|
Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies
sponsored by IBM Line of Business
WHITE PAPER:
The U.S. healthcare system is on an unsustainable path that will force its transformation.
Posted: 22 Feb 2008 | Published: 01 Jan 2007
|
|
|
Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER:
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008
|
|
|
Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER:
Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
The importance of security assessments
sponsored by IBM
WHITE PAPER:
This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER:
This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER:
SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007
|
|
|
Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER:
This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007
|
|