Policy Based Management
By: Mimecast
Published Date: Oct 25, 2010
Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.
| |
|
|
By: McAfee
Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
| |
|
|
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
| |
|
|
Read this Cloud Security Planning Guide to make sure your cloud computing initiatives avoid these dangerous - and costly - pitfalls.
| |
|
|
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
| |
|
|
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
| |
|
|
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
| |
|
|
This guide provides an example of an acceptable use policy of computer systems at an organization.
| |
|
|
By: Cisco
Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
| |
|
|
By: Sigaba
Published Date: Aug 21, 2009
This document details the mandated and proposed rules generally referred to as the "HIPAA requirements" and how they affect healthcare organizations and their business partners transmit medical information electronically.
| |
|
|
By: SafeNet
Published Date: Jul 13, 2010
The information presented in this white paper discusses various approaches to cryptography and
key management, and can be used as a starting point for developing an effective policy-based key
management solution.
| |
|
|
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
| |
|
|
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over
a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
| |
|
|
By: SafeNet
Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
| |
|
|
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
| |
|
|
By: NetIQ
Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
| |
|
|
By: Qualys
Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
| |
|
|
By: Kaseya
Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
| |
|
|
By: Qualys
Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
| |
|
|
As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.
| |
|
|
By: CDW
Published Date: Dec 03, 2012
The fact is that IT may be in the dark about who is using mobile devices to access company data.
| |
|
|
By: Cenzic
Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
| |
|
|
By: Cenzic
Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
| |
|
|
This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.
| |
|
|
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
| |
|
|
|