network security

Results 1001 - 1025 of 1145Sort Results By: Published Date | Title | Company Name

The Case for Holistic Security

Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic
    
RiskWatch

The Intersection of Security & Compliance: The New Risk Assessment

Published By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : 
network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance
    
RiskWatch

Extending Your Management Reach to Remote Users

Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access
    
LANDesk

LANDesk Management Suite for ThinkVantage Technologies

Published By: LANDesk     Published Date: Feb 12, 2007
LANDesk Software and Lenovo have teamed up to create an integrated hardware and software management solution to manage your systems from a single console.
Tags : 
it management, network management, remote network management, security management, systems management, landesk
    
LANDesk

Protecting Your Corporate Network: What Do You Know About the Endpoint Device?

Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : 
network security, access control, nac, network access control, intrusion prevention, landesk
    
LANDesk

Front-Line Malicious Code Defense for the Enterprise from a Single Management Console

Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
    
LANDesk

Server Security, Patching and Virtualization

Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization
    
Blue Lane

Benefits of Securing Servers: Enhanced Security, Compliance and Operational Excellence

Published By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : 
server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance
    
Blue Lane

Virtualization Security Playbook

Published By: Blue Lane     Published Date: Aug 31, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands. But in this rush to virtualize, security can fall by the wayside.
Tags : 
virtualshield, virtual shield, virtualization, security, network security, vmware, vm ware, bluelane
    
Blue Lane

Strategies for Delivering Dynamic Security for Virtual Data Centers

Published By: Blue Lane     Published Date: Nov 15, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands.
Tags : 
data center security, datacenter security, data centre, network security, virtual server, virtual data center, server virtualization, blue lane
    
Blue Lane

Protecting Physical Servers and VMs While Preserving Uptime

Published By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : 
high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros
    
Blue Lane

Who Leads in WLAN Security? Comparative Evaluation of Vendor Offerings and Positioning

Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
    
Trapeze Networks

Evaluating a Storage Security Solution

Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
    
Decru

Solving the Firewall/NAT Traversal Issue of SIP

Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony
    
Ingate Systems

Antispam Whitepaper: How to Keep Spam Off Your Network

Published By: GFI     Published Date: Jun 12, 2007
A buyers' guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why.
Tags : 
buyers guide, buyer's guide, buying guide, antispam, anti spam, anti-spam, spam, network security
    
GFI

Why One Virus Engine is Not Enough

Published By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : 
anti virus, anti-virus, virus, norton, network security, email security, intrusion prevention, ips
    
GFI

The Corporate Threat Posed by Email Trojans

Published By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : 
network security, trojan, trojans, anti virus, anti-virus, virus, email security, internet security
    
GFI

Why You Need an Email Exploit Detection Engine

Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi
    
GFI

Protecting Your Network Against Email Threats

Published By: GFI     Published Date: Jun 12, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
Tags : 
network security, virus, anti virus, anti-virus, content checking, mailsecurity, gfi, anti trojan
    
GFI

GFI MailSecurity Deployment Strategies

Published By: GFI     Published Date: Jun 12, 2007
GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003. This technical white paper describes each operating mode and helps you decide which to deploy and whether you should deploy both.
Tags : 
gfi, mailsecurity, email security, anti virus, virus, network security, deployment, implementation
    
GFI

Integrated Network Faxing Key to Improved Productivity and Information Security

Published By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : 
ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security
    
GFI

Patch Management with GFI LANguard N.S.S. & Microsoft WSUS

Published By: GFI     Published Date: Jun 14, 2007
This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Windows Software Update Services (WSUS) to keep your network automatically updated with the latest security patches.
Tags : 
patch, patches, patch management, windows, windows patch, windows update, windows updates, network security
    
GFI

Using GFI LANguard Network Security Scanner to Secure Your Internal Network

Published By: GFI     Published Date: Jun 14, 2007
This document shows you how to use GFI LANguard N.S.S. to identify vulnerabilities on your network (excerpt from manual).
Tags : 
vulnerability assessment, vulnerability management, auditing, audit, security management, languard, pki, patch management
    
GFI

Automating Vulnerability Management for PCI DSS Compliance

Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
    
GFI
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.