Get your company's research in the hands of targeted business professionals.
Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
White Paper Published By: Iovation
Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
White Paper Published By: Imperva
Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world
attacks and APTs, the shortcomings of legacy security solutions,
the capabilities of next-generation firewalls, and security best
Webinar Published By: ESET, LLC.
Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
White Paper Published By: ESET
Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
White Paper Published By: IBM
Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
White Paper Published By: McAfee
Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
White Paper Published By: NetIQ
Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
White Paper Published By: McAfee
Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
White Paper Published By: McAfee
Published Date: Jan 23, 2013
Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
White Paper Published By: Mimecast
Published Date: Oct 17, 2013
"Storage Anywhere & Everywhere" is a new study by Free Form Dynamics sponsored by Mimecast. It includes lessons from expert or 'elite' organizations on how to get control of your data and make it work to your advantage.
White Paper Published By: DataMotion
Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.