Security Reports

Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem
sponsored by NEC Corporation of America
WHITE PAPER: Data de-duplication has recently gained significant industry attention, especially for disk-based backup products.
Posted: 07 Jan 2008 | Published: 01 Jan 2007

NEC Corporation of America

Making it easier for people to access applications and information without compromising security
sponsored by IBM Software Group
WHITE PAPER: This white paper outlines the ways in which a simplified, focused work environment improves user access to enterprise application and information resources, enabling users to be more proactive, innovative and flexible in addressing business challenges.
Posted: 13 Nov 2007 | Published: 01 Apr 2007

TOPICS:  Security
IBM Software Group

Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007

GFI Software

Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER: Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006

Symantec Corporation

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005

BlackBerry

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge