Security IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2025 | Sort Results By: Published Date | Title | Company Name |
The Five Pillars of Transparent Data Security
By: WinMagic Inc.
Published Date: Nov 16, 2012
Examining the five key pillars of transparent data security to help eliminate disruptions in your organization's workflow which place undue burden on users and administrators. Tags : | winmagic, data security, transparent data security, administrative tools, corporate data security | |
| |
|
|
Tolly Report: Symantec Endpoint Protection 12.1 vs. Trend Micro Deep Security 8
By: Symantec
Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others. Tags : | symantec, symantec endpoint protection 12.1, vmware, tolly report, security | |
| |
|
|
Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
By: Citrix
Published Date: Nov 09, 2012
The tension between security and business productivity has never been so acute. To operate at peak performance, firms need workers to access resources in more ways and places than before -- Read for the man reasons to strengthen IT security in cloud. Tags : | citrix, it infrastructure, desktop, virtualization, cloud | |
| |
|
|
EMC Recoverpoint: Business Continuity For Sap Environments Across Distance
By: EMC UK
Published Date: Nov 08, 2012
Business continuity is a critical component to any enterprise data protection strategy and this is especially important for mission critical SAP environments. This paper explores strategies for business continuity and disaster recovery of SAP. Tags : | emc recoverpoint, sap environment, business continuity, disaster recovery, sap | |
| |
|
|
PCI DSS Compliance with Stingray Traffic
By: Riverbed
Published Date: Nov 08, 2012
Payment Card Industry Data Security Standard is a set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. Read on to learn about securing your applications for security standard. Tags : | riverbed, stingray, pci dss compliance, stingray traffic, security | |
| |
|
|
Dennis Technology Labs Report: Enterprise Anti-Virus Protection July - Sept 2012
By: Symantec
Published Date: Nov 08, 2012
Results are in. Symantec Endpoint Protection rated best in independent, real-world tests recently published by Dennis Technology Labs. These tests are designed to more accurately reflect a simulated user environment. Tags : | virual environments, symantec, data security, malware, anti-malware products | |
| |
|
|
Case in Point: System One
By: Webroot
Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security. Tags : | endpoint security, web security, it security, security solutions, case study | |
| |
|
|
Case in Point: Scope
By: Webroot
Published Date: Nov 07, 2012
This case study describes how one of the UK's leading charities used the Webroot Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting. Tags : | web security service, case study, deployment, it security, case study | |
| |
|
|
Case in Point: Cascade Microtech
By: Webroot
Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security. Tags : | case study, web security, cloud, mobility, mobile security | |
| |
|
|
Security Configuration Management
By: Tripwire
Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics. Tags : | security, configuration, basics, security flaw, it assets | |
| |
|
|
Own Your Network with Continuous Monitoring
By: Tripwire
Published Date: Nov 07, 2012
The thought of continuous monitoring is an ancient concept. Many federal agencies are required to continuously monitor their systems. Read on to learn what continuous monitoring is and how organizations can devise a solution that works. Tags : | tripwire, continuous monitoring, security, data breach, it security | |
| |
|
|
10 Steps to Risk-Based Seucirty Management
By: Tripwire
Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment. Tags : | security, tripwire, security management, security based management, data management | |
| |
|
|
Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work
By: Accelops
Published Date: Nov 05, 2012
|
| |