"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Secure Content Management

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 176 - 181 of 181Sort Results By: Published Date | Title | Company Name
White Paper Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability
    
ProofSpace
White Paper Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management
    
RiskWatch
White Paper Published By: Envisional     Published Date: Dec 21, 2006
Now that millions of ordinary, non-geeky families are routinely downloading TV shows and movies without a second thought, digital piracy has clearly gone mainstream.  Download this paper to learn methods for preventing video piracy.
Tags : 
piracy, copyright, copyright infringement, digital piracy, fcc
    
Envisional
White Paper Published By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : 
data warehousing, bdw, banking data warehousing, compliance, risk management
    
IBM
White Paper Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance
    
Cenzic
White Paper Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management
    
Cenzic
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Special Report

Learn more about what’s slowing your operations, the cost of inaction, and how you can start driving availability to meet the speed of customer expectations.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory