Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • White Paper

    Expert Guide to Secure Your Active Directory

    Posted September 27, 2012 - 3:45 pm

    Layered security is the way to go when it comes to protecting Active Directory. This expert e-guide explains the best method to use when planning and designing a security solution. Find out why it is important to secure Group Policy settings and discover how managed service accounts boost server security in R2.
  • White Paper

    Endpoint Buyers Guide

    Posted September 21, 2012 - 12:15 pm

    This buyers guide provides independent research and test results to help you determine your endpoint protection requirements and identify the security vendor that best meets your needs.
  • White Paper

    2012 UTM Buyers Guide

    Posted September 21, 2012 - 12:15 pm

    Learn how to choose a unified threat management (UTM) solution that simplifies network security and data protection by integrating security capabilities within a single platform.
  • White Paper

    2012 Buyers Guide to Web Protection

    Posted September 21, 2012 - 12:15 pm

    The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these advanced solutions do not provide web protection everywhere. This paper identifies today's most critical web threats and provides checklists for you to identify and evaluate the security capabilities you need for the best web protection.
  • White Paper

    Designing a Data Protection Strategy with HP Lefthand, StoreOnce and Tape

    Posted September 18, 2012 - 1:25 pm

    Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

  • White Paper

    Rethinking your enterprise security

    Posted September 18, 2012 - 1:25 pm

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

  • White Paper

    How you build a secure network and growth-ready network that is as agile as your business

    Posted September 18, 2012 - 1:25 pm

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

  • White Paper

    North Shore Credit Union Case Study

    Posted September 18, 2012 - 1:25 pm

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

  • White Paper

    IDC Business Protection Whitepaper

    Posted September 18, 2012 - 1:25 pm

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

  • White Paper

    Five Ways that Identity Federation is Improving Online Security for Government Agencies

    Posted September 13, 2012 - 6:30 pm

    Cloud computing, social networking and mobile devices are improving efficiency and collaboration in the public sector. But anytime, anywhere accessibility also increases the need to simplify, control and secure identities. In addition, the public sector must maintain a strong focus on reducing costs and delivering a positive user experience.
  • White Paper

    Effective Data Leak Prevention Programs: Start by Protecting Data at the Source - Your Databases

    Posted September 12, 2012 - 3:15 pm

    This IDC white paper presents a proactive approach to data protection, discusses the growing threats to business information, and the impact government regulations have on requiring additional data protections.
  • White Paper

    Optimizing Storage and Protecting Data with Oracle Database 11g Release 2

    Posted September 12, 2012 - 3:15 pm

    This document focuses on key Oracle Database 11g capabilities that help IT departments better optimize their storage infrastructure, enabling administrators to deliver a costeffective, scalable information management platform that is easy to manage, and that continues to deliver the performance and availability that todayʼs businesses require.
  • White Paper

    Safely Unleashing The Power of Social Media

    Posted September 10, 2012 - 4:15 pm

    In this whitepaper, "Safely Unleashing the Power of Social Media", you will understand that by being proactive and working with the marketing department to enable them to securely and easily register social media users in their system, you will potentially be in a position to positively influence revenue growth.
  • White Paper

    Empowering Endpoints: Unifying Data Protection

    Posted September 10, 2012 - 12:00 am

    This whitepaper present IT challenges caused by an increasing mobile and collaborative workforce and discusses how Druva can solve these challenges.
  • White Paper

    Polycom Recommended Best Security Practices for Unified Communications

    Posted September 6, 2012 - 3:15 pm

    Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services.
  • White Paper

    Migration Lesson Plan for Educational Institutions

    Posted September 6, 2012 - 3:15 pm

    Education IT leaders at universities and K-12 school systems are under pressure to support improved collaboration and a virtual learning environment. Discover the lessons learned and the benefits realized by those within the education sector who have migrated from the outdated Windows XP operating system to Windows 7.
  • White Paper

    State of Windows 7 Migration in Government

    Posted September 6, 2012 - 3:15 pm

    The results in this report, The State of Windows 7 Migration in Government, represent the responses of IT leaders at federal, state and local agencies and highlight real and perceived migration challenges, satisfaction levels with the OS upgrade, as well preparing for the overall migration experience.
  • White Paper

    The Federal Agenda: How to Optimize a Windows 7 Deployment

    Posted September 6, 2012 - 3:15 pm

    A migration to Windows 7 at federal agencies can help ensure secure desktops, better risk management and lower costs. Migrating hundreds of thousands, of users as was the case for the U.S. Air Force, can be daunting. Discover key considerations for federal agencies and five optimized deployment processes that will maximize migration benefits.
  • White Paper

    A Prescription for Desktop Health

    Posted September 6, 2012 - 3:15 pm

    A Windows 7 migration provides the perfect opportunity to get a handle on notoriously cumbersome application portfolios, replete with many hyper-specific packages often selected by business users and not vetted by IT. Dell's five-phase approach can ease deployment pains.
  • White Paper

    A Prescription for IT Efficiency

    Posted September 6, 2012 - 3:15 pm

    Security is more important in healthcare than other industries. Windows XP, because of its age, is now a security risk on every desktop where it is limping along. Discover the enhanced security features of Windows 7 and learn the best practices healthcare organizations should adhere to for a successful Windows 7 migration.
  • White Paper

    Selecting a Secure, Managed File Transfer Solution

    Posted September 5, 2012 - 12:45 pm

    Are you considering a secure, managed file transfer solution? This in-depth resource shares best practices, checklists and worksheets in evaluating solutions including requirements around security, high availability, workflow, programmability, protocol and operations.
  • White Paper

    Securing The Promise of Virtualization

    Posted September 4, 2012 - 11:30 am

    Read this whitepaper to learn how data center virtualization is the first step in the journey to private clouds that leverage and enhance existing technology assets. Learn about how evolving from hypervisor-driven virtualization to a private cloud architecture, IT can meet business demands for increased agility and flexibility.
  • White Paper

    Best Practices for Business Class File Sharing Solutions

    Posted August 30, 2012 - 4:00 pm

    Learn what's driving the need for improvements in business class file sharing & why IT needs to manage file sharing for the organization.
  • White Paper

    Benefits of Choosing a Cloud-Based Security Solution

    Posted August 29, 2012 - 11:15 am

    Download "Benefits of Choosing a Cloud-Based Security Solution" to lean how cloud-based solutions have significant business advantages such as, ease of implementation and maintenance, reliability and scalability, guaranteed levels of services and total cost of ownership.
  • White Paper

    Messaging and Web Security Best Practices for 2011 and Beyond

    Posted August 29, 2012 - 11:15 am

    The occurrence of malware infiltration has become decidedly worse over the past several years. Download this white paper to learn the risks that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. Find out predictions about global spam and malware problems and best practice on how to stay one step ahead of these threats.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question