Get your company's research in the hands of targeted business professionals.
Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
White Paper Published By: Symantec
Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
White Paper Published By: Tripwire
Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
White Paper Published By: GFI
Published Date: Jun 08, 2007
This white paper examines the requirements to adhere to the Payment Card Industry Data Security Standard (PCI DSS), the implications of non-compliance and how effective event log management and network vulnerability management can help achieve compliance.
White Paper Published By: LockLizard
Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM. It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
White Paper Published By: Allscripts
Published Date: May 01, 2014
Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom.
Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
White Paper Published By: Norse
Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however.
For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
White Paper Published By: Shunra
Published Date: Nov 27, 2007
Effective IT disaster recovery and business continuity planning is essential for every business. All businesses depend on their IT services for moment-to-moment operations. It is vital to ensure that those services are not disrupted due to any disaster. Pre-test your plans in a simulated network.
White Paper Published By: IBM Software
Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
White Paper Published By: Solidcore
Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas. As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.