Get your company's research in the hands of targeted business professionals.
A Security Policy is a plan of action for tackling security issues, or a set of regulations for maintaining a certain level of security. It can span anything from the practices for securing a single computer, to building/premises security, to securing the existence of an entire nation-state.
In this webinar, Jack Heine, Research VP, Gartner, and David Holyoak, CIO of accounting firm Grant Thornton, discuss how to facilitate mobility while minimizing the risk of data exposure using web-based management and anti-theft capabilities.
The Internet and email have stimulated huge productivity gains for employees. Workers quickly and easily access volumes of research on the Web and correspond with a mouse click. Unfortunately, businesses taking advantage of these tools are increasingly faced with daily onslaughts of spam and unwanted Web traffic.
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
White Paper Published By: Okiok
Published Date: Aug 21, 2009
To successfully deploy Single Sign-On today, most organizations have a set of key requirements that must be met. Here are some tips on how focal Point can help organizations seeking Single Sign-On meet those requirements.
Download this information-packed white paper by Nancy Flynn, Executive Director of the ePolicy Institute, for a no-nonsense look at the business risks and legal liabilities associated with employee misuse of the Internet, email, instant messaging (IM), and peer-to-peer (P2P) file-sharing technology.
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
White Paper Published By: Sybase
Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
White Paper Published By: Entrust
Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
White Paper Published By: Netwrix
Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
White Paper Published By: Perimeter
Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.