S Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
S Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes by  IBM

August 24, 2011 - This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.


SearchSecurity.com E-Guide: The critical role of privileged account management in data security by  IBM

August 23, 2011 - Privileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts.


SearchServerVirtualization.com EGuide: The Guide to Running Windows on Xen by  Novell, Inc.

March 06, 2007 - Virtualization has the power to consolidate server rooms and extend the life of hardware investments. This E-Guide from SearchServerVirtualization.com provides a comparison of the leading virtualization platforms: Xen, Virtual Server and VMware.


SearchSoftwareQuality.com E-Guide: ALM and Requirements Management by  SAP America, Inc.

May 30, 2012 - Read this expert e-guide to explore collaborative practices that agile teams are using to minimize requirements churn and become familiar with some of the commercial and open source requirements management tools available today.


SearchSoftwareQuality.com E-Guide: Best Practices for Testing and QA by  SAP America, Inc.

May 25, 2012 - This expert e-guide teaches QA managers ten things to know for successful configuration testing and provides guidance for overcoming five common hurdles of dealing with QA-reluctant CIOs.


SearchSoftwareQuality.com eBook: Best practices for ALM portfolio management by  IBM

September 01, 2011 - Read this e-book to learn software development best practices concerning portfolio management, Agile application lifecycle management (ALM), and project and portfolio management (PPM).


SearchSoftwareQuality.com eGuide: CMMI for development: An overview of a process improvement model by  IBM

August 15, 2011 - Don't miss this e-guide, expertly compiled by SearchSoftwareQuality.com, to learn the basics of CMMI and it's best use cases in today's enterprise environment.


SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by  IBM

September 01, 2011 - Read this expert Tip Guide for workable, profitable embedded software development best practices.


SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by  IBM India Pvt. Ltd

September 01, 2011 - Read this Tip Guide to discover workable, profitable best practices for embedded software development.


SearchSQLServer.com E-Guide: SQL Server Performance and Consolidation by  SearchSQLServer.com

January 26, 2007 - SQL Servers in large data centers that are not coordinated and managed leave administrators scrambling to increase utilization. Download this E-Guide from SearchSQLServer.com contributors and PolyServe to learn about solutions that solve this problem.


SearchSQLServer.com Handbook: Striking It Rich? SQL Server Joins the Rush to Harness, Analyze Big Data by  Sybase, an SAP company

August 07, 2012 - Microsoft has worked to address the big issue of "big data," as companies are dealing with a constant influx of digital information. SQL Server is no exception, and Microsoft has given its enterprise database a big data makeover. This e-book takes a close look at SQL Server 2012 and finds out why some DBAs are flocking to it—and why others aren't.


SearchStorage eGuide: A smarter approach to data protection: 4 best practices by  IBM

May 12, 2011 - There's a big difference between backup and business continuity. When it comes to protecting business critical information, the digital era has brought with it exposure to more threats from more directions than ever before. Download this SearchStorage.com E-Guide to learn all about protecting the use of information and data files.


SearchStorage.com E-Guide: Efficient Storage Management by  IBM

September 02, 2011 - In this E-Guide from SearchStorage.com, you’ll find detailed information on data reduction, compression, deduplication, and other technologies that are designed to make better use of your data storage and help you become a better storage manager.


SearchStorageUK Essential Guide to Backup by  SearchStorage.co.UK

May 08, 2012 - Check out this expert E-Guide to discover the current state of backup, and learn about today's newest available data protection, virtualization and backup technologies.


SearchSystemsChannel.com eGuide: Server Migration for the Midmarket by  IBM

August 15, 2011 - Server migration can be a daunting process for your customers, especially if they do not have a solid plan in place before they begin. This expert e-guide offers best practices to help your clients embark on their server migration projects and ensure a smooth transition.


SearchSystemsChannel.com eGuide: VAR Guide to Storage for Virtual Servers by  IBM

August 15, 2011 - This expert e-guide, brought to you by SearchSystemsChannel.com, explores the storage challenges that frequently accompany server virtualization. Gain insight into best practices your customers can implement to ensure optimal storage performance and the success of their virtual environments.


SearchSystemsChannel.com eGuide: Virtual Server Management Guide for VARs by  IBM

August 15, 2011 - Virtual systems management is a major new opportunity for VARs provided that it is implemented correctly. This expert e-guide explores the fundamentals of virtual systems management from a reseller's perspective and explains how it can allow customers to fully leverage their virtual environments.


SearchVirtualDataCentre.co.UK e-zine, Vol. 1 : Making the Case for a Greener Data Centre by  SearchVirtualDataCentre.co.UK

April 08, 2011 - New mandatory initiatives have recently come into play in the U.K., pushing the idea of “greening up” the data centre higher on every companies’ priority list. Volume 1 of the Virtual Data Centre e-zine gives an overview of how these environmental regulations affect U.K. businesses and what can happen if they don’t comply.


SeatonCorp Delivers Low Cost, High Reliability Virtual Desktops via Quest vWorkspace by  Dell Software

June 26, 2009 - Read this case study to see how the benefits of Quest® Software's vWorkspace helped SeatonCorp achieve lower cost, enhanced capabilities, higher reliability, easier management and easier end-user IT support.


Seattle Children's Hospital turns Big Data into better care by  IBM

November 25, 2013 - Data integration is the answer for modern organizations dedicated to providing better service. Listen to this webcast case study to learn how integrating data can help get simple questions answered quickly so that organizations can then ask more complex questions and enhance their capabilities.


Seattle Children’s increases productivity 130% and saves $1.5 million by  Nuance

October 16, 2013 - This brief video shows how a Seattle-based hospital transcribes documents at 410 lines/hour – or 19 million lines of transcription a year – and saves about $1.5M.


Second 'Annual Cost of Cyber Crime' Study by  ArcSight, an HP Company

August 03, 2011 - This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.


Secrets of a Great API: Core principles for delivering successful APIs by  MuleSoft

April 28, 2014 - Application programming interfaces (APIs) offer tremendous value to modern companies as they can enhance developer productivity, help monetize digital assets, and add value to the business by allowing developers to enhance your services. This informative resource uncovers four secrets of building a stellar API.


Secrets of Effective Web Content Management by  Limelight Networks, Inc.

November 07, 2012 - Your Web presence is vital to future success, but what was once considered a well-designed website is a thing of the past. Read this essential guide to learn how mobility and customer relationship management (CRM) are impacting web content management (WCM) best practices and find out how to select the right WCM system.


Secrets of Successful Self Service BI by  SearchBusinessAnalytics

February 05, 2013 - In today's fast-paced atmosphere, consumers want their information to be available instantly. View this white paper to learn more about how you can give business users easy-to-use BI tools and let them complete their own data anaylsis and reports. Find out how you can provide BI teams the use of self-service applications by reading this resource.


Secrets to Shrinking Your Storage for VMware by  NetApp

December 19, 2008 - VMware has drastically increased storage capacity requirements, but deduplication functionality can help reverse this effect. Read this white paper to learn how real IT shops have managed to achieve space capacity savings in the virtualized data center.


Secure Access and Continuity in a Virtualized and BYOD World by  Hewlett-Packard Company

January 31, 2014 - This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.


Secure Agile Development with HP Quality Center and Application Security Center by  Hewlett-Packard Company

February 15, 2010 - This white paper show you how to gain effective, efficient Agile software development with market leading HP quality assurance and Web application security software. Read more for all the details.


Secure and Compliant Collaboration and Access by  IBM

March 31, 2008 - As part of its comprehensive security framework, IBM offers a broad, unified array of integrated access authorization and identity management solutions that enable organizations to secure their collaboration and access processes in alignment with their overall business needs.


Secure and Effective Data Extraction from the SAP® ERP System by  Winshuttle, LLC

December 10, 2008 - This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security.


Secure by Design Protection for Application and Desktop Virtualization by  Citrix

May 22, 2014 - This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.


Secure By Design: Building Identity-based Security into Today’s Information Systems by  IBM

March 11, 2013 - Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource.


Secure Cloud Access Reference Architecture & Use Model by  Intel

March 17, 2011 - This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).


Secure Cloud Access Reference Architecture Model by  Intel

May 10, 2011 - Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.


Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure by  Radiant Logic, Inc.

December 31, 2012 - This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.


Secure Enterprise e-mail Solutions with Microsoft® Exchange by  Agilysys-Sun Technology Solutions

July 07, 1967 - This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.


Secure Enterprise File Sharing by  Citrix Systems, Inc.

August 23, 2013 - IT organizations today face an urgent need to get control over file sync and sharing in the enterprise. This short video discusses considerations for secure enterprise file sharing, including recommendations on how to securely and easily share files, access them from anywhere and sync them across devices.


Secure File Transfer in the Era of Compliance by  Ipswitch WhatsUp Gold

July 30, 2007 - Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information.


Secure File Transfer Solution Saves Bank Time and Money by  Linoma Software

March 24, 2010 - Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.


Secure File Transfer Tech Guide by  SearchSecurity.com

February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.


Secure File Transfer: Send it Fast, but Send it Safely by  SearchSecurity.com

April 14, 2014 - FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.


Secure internet routing by  ComputerWeekly.com

April 10, 2014 - This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.


Secure Internet Single Sign-On (SSO) 101 by  Ping Identity Corporation

June 08, 2009 - Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution.


Secure iPhone Access to Corporate Web Applications by  F5 Networks

November 13, 2013 - This exclusive resource discusses how your organization can secure one of the top mobile devices on the market, ensuring that its access to corporate web applications is safe.


Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data by  OpenText

October 30, 2013 - In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.


Secure Mobile Access to Corporate Applications by  F5 Networks

November 15, 2013 - This exclusive paper discusses how your organization can keep access to mobile business applications secure, analyzing a solution that provides benefits such as user authentication, SSO capability, and saving credentials.


Secure Mobile Collaboration by  Cisco Systems, Inc.

January 22, 2014 - Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile.


Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption by  Aladdin Knowledge Systems

August 01, 2008 - Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.


Secure Mobile Printing for Business by  Hewlett-Packard Limited

October 08, 2013 - This informative white paper discusses how your organisation can enable reliable printing from any mobile platform or operating system while still providing IT administrators the control over network access and output to protect confidential information.


Secure Network Access for Personal Mobile Devices by  Cisco

September 30, 2012 - This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.


Secure Offsite Data Storage: It Keeps You Running by  Iron Mountain

October 22, 2012 - Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage.


Secure Remote Access by  RSA, The Security Division of EMC

September 26, 2007 - This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...


Secure Remote Access Tools and Techniques by  TechTarget

March 18, 2014 - Share your top secure remote access plans, priorities, and challenges for next year and you'll gain exclusive access to "Secure Remote Access Tools and Techniques" – a reference guide compiled by our editorial experts that is guaranteed to help you provide faster, more secure remote access support to end-users.


Secure Remote Access your Users will Love by  Citrix

January 06, 2014 - This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose.


Secure Search: Balancing Security with the Need for Information Access by  EMC Corporation

May 01, 2008 - This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search.


Secure Smartphone Apps: The Next Generation by  BlackBerry

April 07, 2010 - The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.


Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by  Forum Systems

September 13, 2005 - Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more.


Secure Tape Vaulting Strategies for Serious Data Protection by  Iron Mountain

February 28, 2012 - Your tapes deserve the best protection possible. Ensure they get it by reading this white paper filled with best practices for keeping data safe and secure. Discover the benefits associated with data housed onsite vs. offsite, learn 3 key questions to ask regarding your existing backup strategy, discover four keys to tape success and more.


Secure the Enterprise with Confidence by  IBM

July 31, 2013 - This informative paper examines how organizations are addressing this increase in security threats and how today's mainframe can be used as a secure application platform.



September 18, 2013 - This expert guide examines on the common types of attacks used against two-factor authentication, and discusses what they can mean for future security threats and how you can protect against them.


Secure Unified Access with Cisco Catalyst 2960-X and 2960-XR Series Switches by  Cisco

December 31, 2013 - This informative whitepaper explores the security benefits of an industry leader's networking switch technology.


Secure Virtual Desktop Infrastructure for HIPAA Compliance by  Imprivata

April 23, 2014 - This white paper explores the benefits of a virtual desktop infrastructure (VDI) for healthcare facilities trying to implement mobile devices for improved secure patient data access.


Secure Web Gateway Deployment Methodologies by  BlueCoat

September 09, 2010 - In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users.


Secure Web Gateway Overview: Implementation Best Practices by  SearchSecurity.com

May 10, 2013 - This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!


Secure Web Gateway Overview: Implementation Best Practices by  Sophos, Inc.

November 27, 2012 - This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.


Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations by  SonicWALL

July 06, 2009 - This paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer.


Secure Your Backup Tapes Every Step of the Way by  Iron Mountain

July 31, 2012 - This short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service.


Secure your data – protect your business by  ComputerWeekly.com

November 12, 2012 - This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.


Secure Your Journey to the Cloud with Data Protection by  Trend Micro, Inc.

October 07, 2011 - View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security.


Secure Your Mobile Content While Increasing Productivity by  Accellion, Inc.

December 31, 2013 - This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.


Secure, Affordable, and Easy to Administer Healthcare Networks by  HP & Intel®

May 09, 2011 - With HP networking solutions as a cornerstone, the HP Converged Infrastructure delivers an architectural blueprint that integrates servers, storage, and networking, eliminating technology silos and freeing up resources to focus more on implementing new and innovative programs.


Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management by  BlackBerry

July 18, 2014 - This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keeping user information separate and private.


Secure, Optimized Global Access to Corporate Resources by  F5 Networks

November 15, 2013 - This exclusive paper examines a unified access solution that provides end-to-end availability and optimization with secure unified access, extending the application policy to the client.


Secure, Reliable, Any-Size File Transfer with FileXpress by  Attachmate Corporation

February 20, 2013 - This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.


Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager by  Novell, Inc.

December 08, 2009 - Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.


SecureAnywhere Web Security service by  Webroot

May 17, 2013 - This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users.


Securely Accelerate Your Mobile Business by  CA Technologies.

December 11, 2013 - This exclusive paper discusses how you can take an application- and data-centric approach to mobile security so you can balance business enablement with protection, all the while maintaining user privacy.


Securely Enable Online Business by  CA Technologies.

September 10, 2012 - Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.


Securely Enabling VoIP Remote Users by  Sipera Systems

August 01, 2008 - This white paper details the requirements for securely enabling VoIP remote users and why traditional data security products, such as IPSec VPNs, are not able to properly handle them.


Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by  GeoTrust, Inc.

May 16, 2013 - This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!


Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by  GeoTrust, Inc.

December 19, 2012 - This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.


Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by  SearchSecurity.com

October 17, 2013 - Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.


Securely Manage Enterprise Data and Apps with SAP® Afaria® for iOS 5 by  SAP AG

July 22, 2013 - This exclusive paper examines a mobile device management solution that provides the freedom that mobile workers have come to expect from their own devices while ensuring that IT has secure control to keep corporate data safe and compliant.


Securely Outsourcing to the Cloud: Five Key Questions to Ask by  CA Technologies.

July 31, 2012 - This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more.


Securely Publish and Manage Web APIs with CloudControl by  Layer 7 Technologies

July 20, 2011 - Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.


Secure with Confidence: Secure Your Enterprise with zEnterprise by  IBM

July 31, 2013 - Check out this exclusive white paper to find out about IBM zEnterprise System and the results of a study of customers spending patterns who have deployed it.


Securing a Dynamic Infrastructure by  IBM

June 12, 2009 - This white paper describes how security that is built into a dynamic infrastructure can mitigate risks, enabling agility, secure collaboration, and business transformation. The IBM Security Framework and lifecycle approach can help address changing business requirements.


Securing AD to Meet Regulatory Compliance by  SUSE

March 01, 2006 - With the myriad of regulations and their vague requirements, organizations must secure their Active Directory environment to comply with regulations and satisfy external and internal auditors.


Securing and Controlling Sensitive Data in the Cloud by  Trend Micro

December 31, 2012 - This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.


Securing and Managing Your Enterprise: An Integrated Approach by  Novell, Inc.

December 04, 2009 - Your organization has a dizzying number of platforms, directories, systems and applications - all requiring your attention and administration. So how can you integrate and automate fragmented management tasks while addressing a full range of GRC issues? You can choose the security and system management solution from Novell®


Securing and Mitigating Risk in the Cloud by  SearchSecurity.com

July 18, 2013 - Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition.


Securing Business Communications Applications in Converged Networks - Best Practices by  Avaya Inc.

June 01, 2008 - Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.


Securing Cloud Computing For Enterprise Collaboration by  IntraLinks, Inc

April 21, 2014 - Consult the following white paper to explore the current state of security in the cloud as well as what you need to look for when selecting an appropriate vendor for your business. Learn about the 4 security areas that need to be covered, tips for getting info from service providers, security check lists, and more.


Securing Corporate Data in the Age of Mobile Computing by  SearchSecurity.com

January 20, 2012 - This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.


Securing Data Stored On Tape With Encryption by  Quantum Corporation

July 01, 2009 - With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.


Securing Data Stored on Tape with Encryption by  Quantum Corporation

April 30, 2010 - Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help.


Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution by  Quantum Corporation

October 23, 2008 - Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise.


Securing Data, Not Endpoints: The Best Way to Control Consumerization by  SearchSecurity.com

November 27, 2012 - Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.


Securing Embedded Software with Threat Modeling by  Klocwork

September 02, 2011 - This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.


Securing End-User Mobile Devices in the Enterprise by  IBM

August 12, 2011 - As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.


Securing Medical Devices by  McAfee, Inc.

May 25, 2012 - This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information.


Securing microsoft exchange 2010 With Thawte SSL Certificates by  Thawte Inc.

July 12, 2011 - Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010.


Securing Microsoft Exchange 2010 with VeriSign Authentication Services by  VeriSign EMEA

October 26, 2011 - This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).


Securing mobile devices in the business environment by  IBM

October 31, 2011 - As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.


Securing Network Access for Guests and Contractors by  Bradford Networks

December 12, 2011 - This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.


Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs by  Apani

November 18, 2008 - This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management.


Securing PostgreSQL from External Attack by  EnterpriseDB Corporation

November 09, 2009 - Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets.


Securing Privilege Delegation in Public and Private Cloud Computing Infrastructure by  BeyondTrust Corporation

June 10, 2010 - As an emerging trend that provides rapid access to dynamically scalable and virtualized IT resources, cloud computing promises new and exciting opportunities for organizations to create lean, robust and cost-effective IT infrastructures that better align with business goals. Read this paper to find out more.


Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by  Hewlett-Packard Company

July 21, 2009 - Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses.


Securing SharePoint: SharePoint Security Best Practices by  Thawte Inc.

May 16, 2013 - This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.


Securing the Administration of Virtualization by  RSA, The Security Division of EMC

March 10, 2010 - In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization.


Securing the Borderless Enterprise by  Websense, Inc.

February 04, 2010 - A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more.


Securing the Cloud for the Enterprise by  Symantec Corporation

September 22, 2011 - Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.


Securing the enterprise application layer: Expert Guidelines by  IBM

August 24, 2011 - If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.


Securing the Everywhere Network by  SonicWALL

November 01, 2008 - Everywhere networking streamlines facilities and energy costs, eliminates commuting time and expenses, builds global business partnerships, broadens markets and staffing pools and shortens customer response times.


Securing the Foundation of Information Technology (IT) Systems by  Trusted Computer Solutions

January 12, 2010 - This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.


Securing the Mobile Cloud Connected Enterprise by  CA Technologies.

June 12, 2014 - This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.


Securing the mobile enterprise with IBM security solutions by  IBM

August 12, 2013 - Thisinformative resource discusses a portfolio of mobile security solutions that take an adaptive approach to security and can drive down costs.


Securing the Next-Generation Data Center by  McAfee, Inc.

August 11, 2011 - Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation.


Securing the Organization: Creating a Partnership between HR and Information Security by  ISC2

September 09, 2008 - The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.


Securing the Physical, Virtual, Cloud Continuum by  Juniper Networks, Inc and Plan B Technologies, Inc

July 26, 2010 - Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure.


Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by  Websense, Inc.

July 14, 2011 - Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.


Securing the Virtual World by  WatchGuard Technologies, Inc.

September 27, 2012 - With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach.


Securing Today’s Mobile Workforce by  Juniper Networks, Inc.

February 15, 2012 - BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.


Securing Virtual Compute Infrastructure in the Cloud by  SAVVIS

February 02, 2011 - Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and reduce costs, enterprises have recently implemented virtualization to obtain on-demand access to additional compute resources.


Securing virtual desktop infrastructure with Citrix NetScaler by  Citrix

March 11, 2013 - In this informative resource, discover an appliance tool that integrates an extensive set of network and application-layer protection mechanisms with advanced access and action control capabilities to improve the availability, performance and scalability of your virtual desktop infrastructure.


Securing Virtual Environments by  CA Technologies.

October 06, 2010 - Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.


Securing Virtualised Environments and Accelerating Cloud Computing by  CA Technologies

May 01, 2010 - There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.


Securing Virtualization in Real-World Environments IBM Internet Security Systems by  IBM

June 25, 2009 - With shrinking budgets, organizations are trying to do more with less. But doing so may leave gaps in security, reliability and availability. Read this white paper to see how IBM security solutions can help you address challenges with virtualization, while safeguarding your agency.


Securing Virtualized Data Centers by  Trend Micro, Inc.

December 14, 2009 - On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.


Securing Virtualized Environments and Accelerating Cloud Computing by  CA Technologies.

June 18, 2010 - There is no question that virtualization offers compelling tangible benefits for an IT organization. Virtualization is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualization security, the CA Technologies Access Control (AC) solution, and how to accelerate cloud computing.


Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by  Centrify Corporation

March 19, 2009 - This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators.


Securing Web Applications and Databases for PCI Compliance by  Imperva

July 12, 2009 - This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.


Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g by  Oracle Corporation

June 29, 2012 - While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.


Securing Your Business with Your Network: Security Made Simple by  Cisco Systems, Inc.

December 01, 2006 - Network security is essential for your business because it allows employees and vendors to access company voice and data services over a secure network connection, wherever they may be located. Read this paper to learn how to secure your business network


Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate by  Thawte Inc.

July 03, 2012 - This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.


Securing your Midsized Business by  IBM

October 31, 2013 - This guide explores security management strategies and how to combat the growth of sophisticated threats.


Securing your Online Data Transfer with SSL by  Thawte Inc.

July 05, 2012 - This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.


Securing Your Private Keys as Best Practice for Code Signing Certificates by  Thawte Inc.

September 30, 2013 - This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.


Securing your Private Keys as Best Practice for Code Signing Certificates by  VeriSign EMEA

July 28, 2011 - This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts