Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER:
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008
|
|
|
Small Business Security: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Enterprise Security Solutions by Trend Micro
sponsored by Trend Micro, Inc.
RESOURCE CENTER:
This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 26 Jan 2009 | Published: 26 Jan 2009
|
|
|
IBM Tivoli Security User Compliance Management Demo
sponsored by IBM
SOFTWARE DEMO:
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008
|
|
|
Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER:
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008
|
|
|
Ethical Hacking and Risk Assessments
sponsored by Global Knowledge
WEBCAST:
Attend this webcast to learn about risk assessment process and tools used by ethical hackers.
Posted: 10 Dec 2008 | Premiered: Dec 10, 2008
|
|
|
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
sponsored by MarkMonitor
CASE STUDY:
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
Posted: 10 Oct 2008 | Published: 09 Oct 2008
|
|
|
Network Security Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
Defining Your Corporate Mobile Policies
sponsored by TechTarget Security
EGUIDE:
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008
|
|
|
Developing an Effective Corporate Mobile Policy
sponsored by BlackBerry
WHITE PAPER:
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
Posted: 19 Jun 2008 | Published: 01 Jun 2008
|
|
|
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
sponsored by Lumension
CASE STUDY:
Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Posted: 07 Feb 2008 | Published: 01 Jan 2007
|
|
|
Parkview Adventist Medical Center Clinicians Get Security at Their Fingertips with Imprivata
sponsored by Imprivata
CASE STUDY:
By incorporating finger biometric scanning into the solution, Parkview would enable each doctor or nurse to log on to any PC at the facility with a single fingertip swipe.
Posted: 24 Jan 2008 | Published: 01 Jan 2007
|
|
|
Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER:
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007
|
|
|
A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER:
This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007
|
|
|
The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE:
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007
|
|
|
Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER:
The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006
|
|
|
Cascading Risk
sponsored by Core Security Technologies
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)
|
|
|
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER:
This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006
|
|
|
Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by Forescout Technologies, Inc.
WHITE PAPER:
Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006
|
|
|
Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER:
Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007
|
|
|
Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER:
Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007
|
|
|
10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER:
Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006
|
|
|
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY:
This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006
|
|
|
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER:
Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006
|
|