REGISTER

Information Security

Online Tech

Organizations seeking to protect sensitive and mission-critical data quickly realize that there is no single answer to keep all systems completely secure. Online data security is a complex, rapidly evolving landscape, requiring robust and layered protections. Encryption is one tool in a comprehensive defense-in-depth strategy to mitigate the risk of accidental and intentional data breaches.

Voltage Corporate Solution Brief

Voltage Security delivers a secure, scalable and proven data protection solution that seamlessly protects all the key data that is critically linked to every facet of the business. Leveraging breakthrough encryption technologies, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive data.

FireEye

Despite spending more than $20 billion annually on IT security, over 95 percent of companies harbor advanced malware within their networks. Learn how to combat the cybercriminals that continue to outsmart older, signature-based security technologies.

www.boxtone.com

Focused on protecting corporate information as your workforce goes mobile, this CISO Handbook explains:

Enterprise Security for Big Data

Momentum behind Big Data is growing with recognition of the competitive advantage for companies who successfully harness Big Data versus those who delay. "Data-driven decision-making enables a statistically and economically significant lead in profitability and productivity"*, according to the Harvard Business Review.

www.forescout.com

Written by security industry analyst Phil Hochmuth of IDC, reviews BYOD trends and risks, the mobile security landscape, policy development and control options. The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.

www.lockpath.com

An increasingly common question is "How do I implement ISO 31000 with your Governance, Risk and Compliance (GRC) platform?" This white paper introduces in broad strokes the purpose and approach of ISO 31000.

Voltage

Enterprises adopting cloud-based IT applications and services achieve dramatic cost and competitive advantages, and those advantages appear to be accelerating with new technology enablers around mobile, Big Data, and SaaS applications.

www.boxtone.com

This technical white paper drills down on how IT organizations can use BoxTone's enterprise-grade capabilities in addition to IT GRC (Governance, Risk management and Compliance) and SIEM (Security Incident and Event Management) systems to mitigate security risks, prevent data breaches, and block unauthorized access to corporate networks via iPhone, iPad, Android and other mobile devices.

SDG Corp

Businesses today have a multitude of security tools and technologies spread across the enterprise. As a result, most IT organizations must work with a security posture cobbled together from so many individual solutions that it is impossible to get a unified view at any given point in time. Given the amount of data generated by security tools, vulnerability tools, policy violations, highly privileged access reviews, and more, organizations need a structured way to understand their security posture.

www.fixmo.com

Fixmo SafeZone is a secure workspace solution that keeps all corporate email, documents, data and applications encrypted, contained and under IT control on the latest iOS and Android devices. It provides a secure and controlled environment where all business applications remain separated and protected from the personal side of the device.

www.forescout.com

Risks and Options to Control Mobile, Wireless and Endpoint Devices

Written by distinguished security industry analyst Mike Rothman of Securosis

Brainloop

As organizations increasingly participate in a collaborative economy, sharing documents becomes ever more crucial. Documents travel farther and wider than ever before due to expanding corporate ecosystems and increasingly virtualized business networks encompassing more partners, joint ventures, and collaborative projects.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top