Lumension

Displaying 1-15 of 15 results

  • Webcasts // Jul 2010

    Three Ways to Reduce Power Consumption Costs,While Improving Your IT Security and Productivity

    Organizations stand to save themselves a significant amount of money by managing the power consumption of their IT systems. But if they aren't careful, they could potentially save their way right into a security and operational nightmare. When power management is not centralized nor built into your overall IT operational...

    Provided By Lumension

  • White Papers // May 2010

    Medical Records on the Run: Protecting Patient Data with Device Control and Encryption

    As the electronic medical records revolution takes hold of the healthcare industry, the benefits and drawbacks of digitized health documentation are being revealed.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies with NERC CIP Compliance

    Through process automation and security control enforcement, Lumension eases the NERC CIP compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in Healthcare IT Security and Compliance

    Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in FISMA Compliance

    Through process automation, continuous compliance reporting, and security control enforcement, Lumension eases the FISMA compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • Downloads // Dec 2009

    Lumension Security Application Scanner

    The Lumension Security Application Scanner is a network-based scanning utility that provides IT departments and executives the ability to discover what applications are running within a network. Unwanted and unauthorized applications can introduce malware, decrease performance, consume diskspace, waste network bandwidth and even slow user productivity. The Lumension Security Application...

    Provided By Lumension

  • Webcasts // Dec 2009

    Moving Beyond AV to Ensure Secure and Compliant Endpoints

    In today's Web 2.0 world, software is more distributed than ever before. Employees download a variety of Internet applications on a regular basis, with each new download altering system configurations and increasing your exposure to malicious software. Financially motivated cybercriminals are designing malware attacks to specifically bypass traditional security methods...

    Provided By Lumension

  • Webcasts // Dec 2009

    Harmonizing Controls to Reduce Your Cost of Compliance

    Mounting regulations across the globe have increased the cost and burden on organizations. The high cost is especially felt by organizations which must adhere to multiple requirements - 75 percent of organizations must comply with two or more regulations and corresponding audits and more than 40 percent must comply with...

    Provided By Lumension

  • Webcasts // Dec 2009

    Device/Port Control and Data Encryption within Microsoft System Center

    Today's global enterprise is more mobile than ever. Data can be transferred via removable storage devices quite easily, enhancing productivity but also introducing risk such as data loss and theft, as well as malware introduction via removable devices / media. While organizations have been able to maximize the value of...

    Provided By Lumension

  • Webcasts // Dec 2009

    Keys to Aligning Security and Compliance - How to Connect the Dots

    The pressure is on as organizations today face mounting demands to maintain an enterprise-wide security posture while adhering to the growing number of compliance regulations. Without the right processes and tools to effectively navigate through the security and compliance maze, IT professionals often resort to manually poring through spreadsheets and...

    Provided By Lumension

  • Webcasts // Jun 2009

    Live Event: Profile of the World's Top Hackers

    Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing damage. And this current economic climate has undoubtedly created more opportunities for hackers, criminals, and industrial espionage firms who are targeting critical infrastructures and systems to...

    Provided By Lumension

  • White Papers // May 2009

    Achieving Federal Desktop Core Configuration Compliance With Lumension Solutions

    The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. These FDCC guidelines were developed at...

    Provided By Lumension

  • White Papers // Mar 2009

    Compliance with Data Handling Procedures in UK Government

    The UK Data Handling Procedures in Government Report set out clear and mandatory procedures to be followed by all government employees that have access to and responsibility for citizen data. The Report was drafted at the request of Prime Minister, Gordon Brown, in response to HMRC's loss of 2 compact...

    Provided By Lumension

  • Downloads // Dec 2008

    Assess Your Network for Vulnerabilities with Lumension Vulnerability Scanner

    In today's Web 2.0 IT environment, the risks to your business systems and vital information continue to rise. Vulnerabilities across operating systems, applications and system configurations are exploited at a faster rate than ever before. And more than 90 percent of attacks exploit vulnerabilities for which a patch existed. Take...

    Provided By Lumension

  • Downloads // Jul 2008

    Quantify Your Insider Risk with Lumension Device Scanner

    In today's borderless enterprise, your data is more at risk from insiders than ever before. With removable devices like USB sticks continuing to increase in storage capacity, it has never been easier to access and transport large amounts of data and as such protecting your sensitive information has never been...

    Provided By Lumension

  • White Papers // May 2009

    Achieving Federal Desktop Core Configuration Compliance With Lumension Solutions

    The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. These FDCC guidelines were developed at...

    Provided By Lumension

  • Downloads // Dec 2009

    Lumension Security Application Scanner

    The Lumension Security Application Scanner is a network-based scanning utility that provides IT departments and executives the ability to discover what applications are running within a network. Unwanted and unauthorized applications can introduce malware, decrease performance, consume diskspace, waste network bandwidth and even slow user productivity. The Lumension Security Application...

    Provided By Lumension

  • Webcasts // Dec 2009

    Moving Beyond AV to Ensure Secure and Compliant Endpoints

    In today's Web 2.0 world, software is more distributed than ever before. Employees download a variety of Internet applications on a regular basis, with each new download altering system configurations and increasing your exposure to malicious software. Financially motivated cybercriminals are designing malware attacks to specifically bypass traditional security methods...

    Provided By Lumension

  • Webcasts // Dec 2009

    Harmonizing Controls to Reduce Your Cost of Compliance

    Mounting regulations across the globe have increased the cost and burden on organizations. The high cost is especially felt by organizations which must adhere to multiple requirements - 75 percent of organizations must comply with two or more regulations and corresponding audits and more than 40 percent must comply with...

    Provided By Lumension

  • Webcasts // Dec 2009

    Device/Port Control and Data Encryption within Microsoft System Center

    Today's global enterprise is more mobile than ever. Data can be transferred via removable storage devices quite easily, enhancing productivity but also introducing risk such as data loss and theft, as well as malware introduction via removable devices / media. While organizations have been able to maximize the value of...

    Provided By Lumension

  • Webcasts // Dec 2009

    Keys to Aligning Security and Compliance - How to Connect the Dots

    The pressure is on as organizations today face mounting demands to maintain an enterprise-wide security posture while adhering to the growing number of compliance regulations. Without the right processes and tools to effectively navigate through the security and compliance maze, IT professionals often resort to manually poring through spreadsheets and...

    Provided By Lumension

  • White Papers // May 2010

    Medical Records on the Run: Protecting Patient Data with Device Control and Encryption

    As the electronic medical records revolution takes hold of the healthcare industry, the benefits and drawbacks of digitized health documentation are being revealed.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies with NERC CIP Compliance

    Through process automation and security control enforcement, Lumension eases the NERC CIP compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in Healthcare IT Security and Compliance

    Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in FISMA Compliance

    Through process automation, continuous compliance reporting, and security control enforcement, Lumension eases the FISMA compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • Webcasts // Jul 2010

    Three Ways to Reduce Power Consumption Costs,While Improving Your IT Security and Productivity

    Organizations stand to save themselves a significant amount of money by managing the power consumption of their IT systems. But if they aren't careful, they could potentially save their way right into a security and operational nightmare. When power management is not centralized nor built into your overall IT operational...

    Provided By Lumension

  • Webcasts // Jun 2009

    Live Event: Profile of the World's Top Hackers

    Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing damage. And this current economic climate has undoubtedly created more opportunities for hackers, criminals, and industrial espionage firms who are targeting critical infrastructures and systems to...

    Provided By Lumension

  • White Papers // Mar 2009

    Compliance with Data Handling Procedures in UK Government

    The UK Data Handling Procedures in Government Report set out clear and mandatory procedures to be followed by all government employees that have access to and responsibility for citizen data. The Report was drafted at the request of Prime Minister, Gordon Brown, in response to HMRC's loss of 2 compact...

    Provided By Lumension

  • Downloads // Dec 2008

    Assess Your Network for Vulnerabilities with Lumension Vulnerability Scanner

    In today's Web 2.0 IT environment, the risks to your business systems and vital information continue to rise. Vulnerabilities across operating systems, applications and system configurations are exploited at a faster rate than ever before. And more than 90 percent of attacks exploit vulnerabilities for which a patch existed. Take...

    Provided By Lumension

  • Downloads // Jul 2008

    Quantify Your Insider Risk with Lumension Device Scanner

    In today's borderless enterprise, your data is more at risk from insiders than ever before. With removable devices like USB sticks continuing to increase in storage capacity, it has never been easier to access and transport large amounts of data and as such protecting your sensitive information has never been...

    Provided By Lumension