• December 29, 2010 29 Dec'10

    Network Intrusion Prevention (IPS)

    Get advice on how to develop a network intrusion prevention system solution, how to deploy an IPS, such as Snort, and how to choose an IPS.  Continue Reading

  • December 29, 2010 29 Dec'10

    Client security

    Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other ...  Continue Reading

  • December 29, 2010 29 Dec'10

    Mobile client security

    Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Enterprise User Provisioning Tools

    Get tips and tricks on user provisioning, such as how to administer employee access and IDs and passwords, information on user account management and audit and analysis.  Continue Reading

  • December 27, 2010 27 Dec'10

    ISO 17799

    In this resource guide get details, tips and resources on ISO 17799 and ISO/IEC 27002 certification, including auditing and compliance, standards, guidelines, implementation  Continue Reading

  • December 27, 2010 27 Dec'10

    HIPAA

    In this guide get information on the Health Insurance Portability and Accountability Act (HIPAA). Learn about HIPAA privacy laws, compliance, regulations, rules, violations, audits, training and records.  Continue Reading

  • December 27, 2010 27 Dec'10

    Sarbanes-Oxley Act

    In this guide experts define the Sarbanes-Oxley Act of 2002 (SOX) and offer information on guidelines and regulations, penalties, compliance, audits, violations and section 404 and section 302.  Continue Reading

  • December 27, 2010 27 Dec'10

    Web Authentication and Access Control

    Get tips and tricks on Web access authentication and control. Learn when restricting Web access is necessary and how Web application IAM techniques like single sign-on can thwart hacker attacks and threats.  Continue Reading

  • December 27, 2010 27 Dec'10

    User Authentication Services

    In this guide, get tips and advice on user authentication and authorization methods and services: biometrics, two factor and multifactor authentication, single sign-on (SSO), smartcards, PKI.  Continue Reading

  • December 27, 2010 27 Dec'10

    Identity Management Technology and Strategy

    Here you'll get advice on several identity management technologies, how to develop a strategy, how to avoid costly problems and common mistakes, password and ID management, and identity management tools, software and services.  Continue Reading

  • December 27, 2010 27 Dec'10

    Disk Encryption and File Encryption

    Encrypting data at rest, whether at the file level or the disk level, can be a valuable tactic in the fight against hackers. Get advice on how to secure your organization's data with full, hard and whole disk encryption, and how to encrypt files ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Identity Theft and Data Security Breaches

    Get advice on data security, identity theft and information security breaches. Learn about corporate data breach laws and legislation, state disclosure laws including Calif. SB-1386, notification requirements and legal ramifications of data breaches...  Continue Reading

  • December 27, 2010 27 Dec'10

    Enterprise Data Governance

    In this guide to enterprise data governance, get advice on how to protect your data, data backup and recovery, how to develop a data backup strategy, data backup storage and protection methods and technologies.  Continue Reading

  • December 27, 2010 27 Dec'10

    NAC and Endpoint Security Management

    Get advice on how to achieve network and remote access control with NAC and endpoint security solutions. In this resource guide you will get tips on using endpoint software, DMZ and VLAN security and remote access management.  Continue Reading

  • December 27, 2010 27 Dec'10

    Wireless Network Security: Setup and Tools

    In this guide, get advice on wireless network security tools, software and tactics; learn how to build and maintain a secure wireless LAN, and how to successfully configure, implement and manage a solid wireless network.  Continue Reading

  • December 27, 2010 27 Dec'10

    Network Security: Tools, Products, Software

    Strengthen your network defense with security tools, products and software. These resources advise you on how to add and implement components such as perimeter firewalls, as well as what you should know about all-in-one appliances.  Continue Reading

  • December 27, 2010 27 Dec'10

    Network Intrusion Detection and Analysis

    Get advice on network intrusion detection. This resource will teach you how to implement and maintain an intrusion management life cycle. Learn how to protect, detect and analyze network vulnerabilities to mitigate the risk hacker attacks and ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close