"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 4026 - 4042 of 4042Sort Results By: Published Date | Title | Company Name
White Paper Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy
    
NetIQ Corporation
Webinar Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance
    
Symantec
White Paper Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection
    
KACE
White Paper Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation
    
KACE
White Paper Published By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : 
backup, backup and recovery, disaster recovery, compliance, data protection
    
Symantec
White Paper Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control
    
Trusted Network Tech
White Paper Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy
    
Aomega
White Paper Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security
    
Nixu
White Paper Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider
    
Texas Instruments
White Paper Published By: EMC     Published Date: Nov 06, 2006
The following tips can help you keep Exchange running smoothly and let you bounce back quickly from hardware failures that could threaten your Exchange server.
Tags : 
exchange server, top 10, exchange threat, exchange security, network security
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
By utilizing the speed and reliability of the EMC CLARiiON® AX150 networked storage system and the convenience of EMC Retrospect® 7.5 for Windows backup and recovery software, SMBs can implement fast, effective, reliable data protection that is easy to set up and manage without placing undue strain on IT resources.
Tags : 
data protection, raid, disaster plan, disk-based, tape-based
    
EMC
White Paper Published By: EMC     Published Date: Nov 06, 2006
Offsite media can be lost or stolen while in transit, exposing sensitive information to potential misuse. By using AES encryption on backup data, a business can feel confident that sensitive customer information will remain safe and secure, even if the backups tapes are lost of stolen.
Tags : 
disaster plan, encryption, disk backup, tape backup, offsite storage
    
EMC
White Paper Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management
    
Symantec
White Paper Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management
    
Castelle
White Paper Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi
    
A10 Networks
Start   Previous    148 149 150 151 152 153 154 155 156 157 158 159 160 161 162     Next   End


Sub-Categories: Access Control, Application Security, Authentication, Business Continuity, Disaster Recovery, Encryption, Security Management, Security Policies

Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory