Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    How much security do you really need?

    Posted April 26, 2012 - 10:40 am

    In this white paper, you will read not only about analyzing the top security concerns of today, but it outlines a strategic and practical approach to finding the correct solution to meet your needs.
  • White Paper

    Strategies for Assessing Cloud Security

    Posted April 26, 2012 - 10:40 am

    Read this white paper to learn about the security issues you need to consider and how IBM assessment services and guidelines for securing cloud implementations can help you maximize the business value of cloud investments while minimizing risk.
  • White Paper

    Best Practice Guide "Taking a Proactive Approach to Patch Management"

    Posted April 24, 2012 - 5:30 pm

    Outline best practices that can be implemented to ensure your organization can address security proactively, rather than having to react and use valuable resources when viruses, malware or worms attack.
  • White Paper

    Making File Transfer Easier, Compliant and Secure

    Posted April 23, 2012 - 6:10 pm

    The reasons for using email as a file-transfer solution are simple: email is ubiquitous, it is based on industry standards, and it is very easy to use as a drag-and-drop file transfer utility.
  • White Paper

    Security Management 2.0: Time to Replace Your SIEM?

    Posted April 18, 2012 - 5:00 pm

    Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn more.
  • White Paper

    Transitioning from SIEM to Total Security Intelligence

    Posted April 18, 2012 - 5:00 pm

    Learn how security intelligence, powered by next-generation SIEM and log management, enables organizations from Fortune 500 companies to mid-sized enterprises and government agencies to maintain comprehensive and cost-effective information security.
  • White Paper

    Defining Best Practices for IT Security In a Cloudy World

    Posted April 18, 2012 - 5:00 pm

    The rise of cloud computing has been one of the highlights of the last few years. The notion that information technology can be delivered in a highly scalable utility model is generating excitement for both customers and vendors alike. However, there is still a lot of concern regarding security.
  • White Paper

    NSS Labs Next-Generation Firewall Security Value Map

    Posted April 18, 2012 - 10:20 am

  • White Paper

    Simplify Your Audits and Compliance Efforts

    Posted April 11, 2012 - 12:30 am

    Managing compliance is a challenge. Learn how to apply this 3-step process to capture activity on your critical systems, analyze data in real-time, query historical records at the press of a button, and simplify your audits. Find out who did what, when-and why. Get the solution brief now.
  • White Paper

    Simplifying Branch Office Security

    Posted April 10, 2012 - 12:20 pm

    IT security is often focused at the head office, while remote sites and home offices are often neglected, as security devices are expensive and require know-how. Read more about a new approach to providing complete, affordable and easy to manage security to branch offices.
  • White Paper

    Albert School District: A customer success story

    Posted April 10, 2012 - 12:20 pm

    Albert School District gets a lesson in wireless security; Sophos Astaro Wireless Security provides simple management and reliable Internet access.
  • White Paper

    Six Tips for Choosing a UTM Solution

    Posted April 10, 2012 - 12:20 pm

    As network security grows more complex, businesses are demanding the simplicity of unified threat management (UTM). This whitepaper offers you detailed advice on how to choose the comprehensive UTM that best suits your business.
  • White Paper

    Expert Guide to Secure Your Active Directory

    Posted April 6, 2012 - 4:10 pm

    Layered security is the way to go when it comes to protecting Active Directory. This expert e-guide explains the best method to use when planning and designing a security solution. Find out why it is important to secure Group Policy settings and discover how managed service accounts boost server security in R2.
  • White Paper

    Five Tips to Keep IT Auditors Off Your Back

    Posted April 1, 2012 - 12:30 am

    Uh-oh - you're facing an IT audit, but you can't just drop your normal responsibilities to prepare for it. In this Quest white paper, learn five key tips for handling auditors, and the best way to get them what they need while juggling your normal priorities. Read it today.
  • White Paper

    Building in Web Application Security from the Start

    Posted March 29, 2012 - 10:20 am

    This IDC white paper highlights the growing IT challenge of protecting web apps through software improvements and testing. It explains problems associated with web app insecurity, driving factors encouraging improved web app security, and the means to validate app security.
  • White Paper

    Web Application Security e-Kit

    Posted March 29, 2012 - 10:20 am

    IBM Rational® AppScan® can help you effectively design security into your products and services early in the lifecycle, in a way which is resilient to change. Download your complimentary e-Kit now.
  • White Paper

    Small and Medium Business Threat Awareness Report

    Posted March 27, 2012 - 3:00 pm

    How aware are small businesses about cyber threats that impact them? Do they consider the right type of defense against hackers? Find out in the Small and Medium Business Threat Awareness Report.
  • White Paper

    Small Business Endpoint Protection Performance Benchmark Testing Report

    Posted March 27, 2012 - 1:50 pm

    Learn how top endpoint solutions compare in the Small Business Endpoint Protection Performance Benchmark Testing Report.
  • White Paper

    Simplify Your Relationship with Endpoint Security

    Posted March 27, 2012 - 1:50 pm

    Managing endpoint security can be complex, but not out of reach. Understanding the challenges and solutions available are essential in addressing cybercrime. Learn more in the whitepaper Simplify Your Relationship with Endpoint Security.
  • White Paper

    Customer Success - Tree In The Glen

    Posted March 27, 2012 - 1:50 pm

    Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec Endpoint Protection Small Business Edition. Since deployment, the store has had zero virus infections, system performance has improved, and security management time has dropped from three hours a week to 15 minutes.

  • White Paper

    SMB Disaster Prepardness Survey

    Posted March 27, 2012 - 12:41 pm

    SMB Disaster Prepardness Survey which measured the attitudes and practices of small- and mid-sized businesses (SMBs) and their customers toward disaster preparedness. The survey findings show that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also reveals that the cost of not being prepared is high, putting an SMB at risk of going out of business. According to the survey, downtime not only costs SMBs several thousands of dollars, it also causes their customers to leave.
  • White Paper

    Simplify Your Audits and Compliance Efforts

    Posted March 27, 2012 - 9:30 am

    Managing compliance is a challenge. Learn how to apply this 3-step process to capture activity on your critical systems, analyze data in real-time, query historical records at the press of a button, and simplify your audits. Find out who did what, when-and why. Get the solution brief now.

Join today!

See more content
Ask a Question