Home
 > Search

Search

Find the latest technical white papers, webcasts, and product information to help you make intelligent IT product purchasing decisions.
Information Security Selection
Source: Technology Evaluation Centers
Read More...
Executive Brief: Mobility, Security Concerns, and Avoidance
Published On: June 4 2012
Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy. Read More...
Security Strategies for the Midsized Business
Source: Microsoft
Midsize businesses face the same security threats as larger companies, and likewise they must comply with the same regulations. But, their security budgets are smaller. The good news is that IT security systems don’t have to be expensive. Learn about the top three security problems, how to develop security policies using integrated security solutions, and how to do vulnerability assessment with low-cost security tools. Read More...
Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough
Source: Dell KACE
Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective. Read More...
Beyond Digital Rights Management (DRM)
Source: Vitrium Systems
Most document security companies concern themselves solely with the prevention of unauthorized access to content. Online publishers, on the other hand, struggle to find a balance between document security and a satisfactory reader experience. A new approach to document security can give online content publishers the ability to protect their content without adding unnecessary complexity to document access. Learn more. Read More...
Building a Web Application Security Program
Source: Securosis
Today’s Web applications exist in an environment vastly different from when businesses first entered the Internet. Few companies have a comprehensive Web application security program to prevent Internet-borne security breaches. Learn how security concerns for Web applications are different than for traditional applications, and how to build a Web security program that curbs costs and provides effective security. Read More...
Network Security Management
Source: Q1 Labs Inc.
In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents. Read More...
Security Innovation
Security Innovation has been identifying application security risks for top software vendors and US government agencies since its inception. The company offers security services from application testing, to security code review, to auditing. Security Innovation was founded by a recognized authority in software security and is managed by software industry veterans and a team of experts that came from companies like Microsoft, Lockheed Martin, Harris Corporation, and IBM. The company is headquartered in Melbourne, FL (US) and has offices in Boston, MA and Bozeman, MT. Read More...
KSignPKI
Source: KSign KSign’s PKI solution issues digital certificates to authenticate users with digital signatures. The application offers various features to e-commerce applications in a wireless environment, including issuance of certificates, registration of users, time stamps, and real-time certificate verification.     Read More...
Understanding the PCI Data Security Standard
Source: Symantec
The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance. Read More...
|< <  1 2 3 4 5 6 7 8 9 10 ...  > >|
Results 1 - 10 of 1994

Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.