Get your company's research in the hands of targeted business professionals.
Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Webinar Published By: Google Apps
Published Date: May 18, 2011
This person registered for and/or attended a TechRepublic webcast featuring Google's Enterprise Trust and Site Reliability Managers to learn how Google Apps delivers enterprise-ready apps for businesses with exceptional security, global scalability, and reliable operations.
White Paper Published By: Google Apps
Published Date: Nov 23, 2010
This white paper, sponsored by Google, discusses the critical and growing requirements for better email security and email archiving, and it illustrates the benefits of the cloud approach to manage both.
White Paper Published By: GoToAssist
Published Date: Oct 05, 2011
It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground.
This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies. Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
White Paper Published By: Hosting.com
Published Date: Jan 21, 2011
This white paper demonstrates how companies that have moved their SQL databases to the cloud have overcome past performance and security concerns to increase operational efficiency, improve availability and scalability, reduce costs, gain a faster-time to-market, and achieve a better return on investment.
There is no question that mobile computing is growing at an
exponential rate. This rapid transformation has seen security
concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.
Fortify Software conducted a candid interview with Avi Rubin, Professor at Johns Hopkins University and specialist in the field of eVoting security risks. He discusses the concerns around software security as well as the voting solutions surrounding software independence.
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.