systems security

Results 251 - 275 of 312Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
Published By: AppSense     Published Date: Aug 21, 2009
Explore how AppSense Management Suite enables Microsoft Windows 2003 systems to deliver improved overall system security, simplified management and increased capacity and performance.
Tags : 
windows server, windows server 2003, network management, appsense, server optimization
    
AppSense
Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep
    
IBM
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
    
Third Brigade
Published By: Dell Software     Published Date: Jul 18, 2012
Implement PCI Compliance
Tags : 
pci, payment card industry, data security, scriptlogic, mocrosoft windows, it systems, data security, secure network
    
Dell Software
Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management, data protection, privacy, security policies
    
Castelle
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Quocirca     Published Date: Mar 12, 2009
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. However, changes in software, hardware, security and management systems are leading towards server-based computing being suitable for a far larger proportion of an organization's user base.
Tags : 
quocirca, desktop environment, software, hardware, security, management systems, data security, business continuity
    
Quocirca
Published By: RiskWatch     Published Date: Jan 23, 2007
The single most important trend in security in the next ten years will be the integration of various security elements such as information security, physical security and integrated systems security into a single security function.
Tags : 
physical security, network security, security management, cso, chief security officer, security integration, riskwatch
    
RiskWatch
Published By: Blue Lane     Published Date: Aug 31, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands. But in this rush to virtualize, security can fall by the wayside.
Tags : 
virtualshield, virtual shield, virtualization, security, network security, vmware, vm ware, bluelane
    
Blue Lane
Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
    
GFI
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : 
security, security management, access control, identity management, iam, authentication, tracking, workforce
    
Borer Data Systems Ltd.
Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
    
Managed Systems, Inc.
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual
    
ScriptLogic
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security
Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
    
Radiant Logic, Inc
Published By: TDSi     Published Date: Jun 08, 2011
An Essential Guide to Integration of your Security Systems and the Benefits That Can Bring
Tags : 
access control integration, building management system, security management systems, integrated security management systems, integrated access control, intelligent building management system, bms systems, security management systems
    
TDSi
Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.