Get your company's research in the hands of targeted business professionals.
Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
White Paper Published By: Tripwire
Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
White Paper Published By: netForensics
Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
White Paper Published By: Gomez IT
Published Date: Dec 14, 2011
So how can you ensure that your selection process for cloud service providers and partners is fast but well-informed, based on reliable data and mitigates the risk of hidden surprises? Read to find out.
White Paper Published By: Cisco
Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
White Paper Published By: Iovation
Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Next-generation firewalls typically combine the ability to identify and control application use with classic firewall functions. However, there is wide variance in what 'next-generation' really encompasses. Discover the four keys to effective next-generation security.
White Paper Published By: Agile
Published Date: Jan 24, 2011
This paper explains the current environment IT organizations are faced with in terms of hiring and retaining top talent, and provides four hiring strategies technology leaders must consider to remain competitive.
White Paper Published By: NetIQ
Published Date: Jan 13, 2011
This white paper discusses the value of achieving security process maturity, which requires an evolutionary shift-from simply reacting to security threats to creating mature, automated security processes.
Case Study Published By: Bit9
Published Date: Jan 17, 2012
Is your company's network secure? Are your endpoints and servers secured? Before you answer, read this case study on a US Military Command that discovered no matter how much you educate users, hackers can get through traditional defenses.