Presentation Transcript: Endpoint security fundamentals
sponsored by Sophos
PRESENTATION TRANSCRIPT:
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
Posted: 25 Jun 2009 | Published: 25 Jun 2009
|
|
|
Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE:
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009
|
|
|
The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER:
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007
|
|
|
Cisco IT GRC Security Assessment Service
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
Posted: 15 Jun 2009 | Published: 12 Jun 2009
|
|
|
Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER:
This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009
|
|
|
Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER:
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
The Value of Integrated Security
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
Posted: 09 Jun 2009 | Published: 07 Nov 2008
|
|
|
Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER:
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009
|
|
|
The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT:
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009
|
|
|
eBook: Encryption 360 Degrees
sponsored by Informa TechTarget
EBOOK:
Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.
Posted: 21 May 2009 | Published: 20 May 2009
|
|
|
Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT:
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009
|
|
|
Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos
ANALYST REPORT:
Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
Posted: 12 May 2009 | Published: 12 May 2009
|
|
|
Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE:
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009
|
|
|
Information Security Magazine: March 2009 - Sky-High Risk?
sponsored by Information Security Magazine
EZINE:
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
Posted: 20 Apr 2009 | Published: 20 Mar 2009
|
|
|
Data Loss Prevention Survey
sponsored by Symantec Corporation
ASSESSMENT TOOL:
Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER:
The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008
|
|
|
Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK:
Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009
|
|
|
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD:
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009
|
|
|
7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER:
This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009
|
|
|
Business Value Analysis Study: Citizens Business Bank
sponsored by Symantec Corporation
WHITE PAPER:
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
Posted: 09 Mar 2009 | Published: 09 Mar 2009
|
|
|
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
sponsored by IBM
PRESS RELEASE:
Check out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER:
Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Managing the Entire Database Security & Compliance Lifecycle
sponsored by Guardium, an IBM Company
DATA SHEET:
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
Posted: 12 Feb 2009 | Published: 12 Feb 2010
|
|
|
Video - Vulnerability Management in a Web 2.0 World
sponsored by Lumension
VIDEOCAST:
Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Posted: 28 Jan 2009 | Premiered: Jan 28, 2009
|
|