REGISTER

Information Security

www.protegrity.com

The Protegrity Data Security Platform design is based on a hub and spoke deployment architecture. The Enterprise Security Administrator (ESA) enables the authorized Security Officer to determine and set a unique enterprise wide Data Security Policy, and is the management tool (console) for the central control over policy, keys, and reporting.

Datasheet

In 2009, the FBI began investigating a breach of confidential records from the State of Virginia's Prescription Monitoring Program. Hackers had allegedly broken into the system, stolen 8.3 million patient records and were demanding a $10 million ransom to return the data. 1 Earlier that year, the U.S. Federal Aviation Administration had reported a similar incident wherein one of its systems had been hacked into, compromising the personal information of 45,000 employees.

Wirehead

Sound Bank, headquartered in Morehead City, North Carolina, has grown over years of operation from an upstart bank with twelve employees to a thriving community bank with $133 million in assets, business has expanded, the Bank has made it a policy to protect their valuable financial information by conducting regular vulnerability assessment and penetration testing.

Network-Stop threats before they happen. This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield), using Adena Health System as a case study.

ISACA

In the complimentary new white paper titled "Securing Mobile Devices," ISACA, a leading global association for enterprise governance of information technology (IT), noted that the use of wireless networks, typically less secure than wired networks, leaves information at greater risk for interception.

Wirehead

The Eastern Band of the Cherokee Nation Protects Tribal and Governmental Information with Extensive The Eastern Band of the Cherokee Nation members, half of whom live on tribal land in North Carolina near the Great Smoky Mountains National Park.

Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.

enterasyslogo

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Wirehead

Canal Insurance Company has insured commercial truckers for over 60 years. Headquartered in Greenville, South Carolina, the company provides a wide range of insurance products through a nationwide network of independent agents.

www.lumension.com

Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online.

Read this white paper about a tactical guide enabling you to take action and achieve operational excellence.

The purpose of this white paper is to provide an overview of next-generation data protection and recovery options that are designed and priced specifically for small and midsized businesses (SMBs).

www.mxlogic.com

The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top