Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
ACLReporter
Winzero offers security against accidental loss of data. ACLReporter offers comprehensive security analysis and reporting for items such as folders and files on NTFS volumes, and Shares to discover ho...
Provided By Winzero Custom Solutions
-
McAfee Threatscan 2.5
McAfee ThreatScan helps administrators who want to quickly and easily find their viral vulnerabilities. It proactively protects network against the cost and damage of outbreaks with scheduled virus vu...
Provided By Networks Associates Technology
-
McAfee VirusScan Command Line Scanner 4.32 for Linux s390
McAfee VirusScan detects and removes viruses. The scanner runs from a command-line prompt, and provides an alternative to scanners that use a graphical user interface (GUI). Both types of scanner use ...
Provided By Networks Associates Technology
-
McAfee Desktop Firewall 8.0
McAfee Desktop Firewall 8.0 proactively defends and controls clients to prevent new threats that anti-virus alone cannot. By providing comprehensive network and application firewall capabilities combi...
Provided By Networks Associates Technology
-
Comparing Architectures For Internet Content Filtering Solutions
This white paper makes the business case for content filtering, explains the pros and cons of different solution architectures, and describes how the SonicWALL solution enables optimum protection and ...
Provided By SonicWALL
-
Intrusion Prevention: Myths, Challenges, and Requirements
Four commonly held misconceptions about intrusion prevention are dispelled in this white paper, which focuses on the realities of shielding an enterprise network from today's complex threats and highl...
Provided By Networks Associates Technology
-
Radiator EAP-SIM Support
This document describes the emerging EAP-SIM authentication standard for Wireless LANs, and outlines the support for EAP-SIM authentication available with Radiator, the full source Radius server from ...
Provided By Open System Consultants
-
Digital Signatures and PKCS#11 Smart Cards: Concepts, Issues and Some Programming Details
With the need for information security in today's digital systems growing, cryptography has become one of its critical components. Digital signatures are one of the many uses of cryptography. PKCS#11,...
Provided By Calsoft Labs
-
Using MDaemon AntiSpam for Spam Control
To help stop Unsolicited Bulk Email (UBE), also known as spam, modern email servers must have configuration options to prevent unauthorized relaying of email messages. In addition, cost-effective and ...
Provided By Alt-N Technologies
-
Anti-Spam White Paper
Unsolicited commercial email, commonly referred to as spam, is growing rapidly and is finding its way to desktops both in the home as well as in the office. The purpose of this paper is to discuss iss...
Provided By Aladdin Knowledge Systems
-
An Arbitration Clause Preventing the Award of Punitive Damages Does Not Bar Arbitration of Antitrust Claims by a Franchisee
It held that the parties' arbitration agreement must be enforced, that an arbitrator is permitted to award antitrust treble damages, and that, in this instance, the arbitral forum is an adequate subs...
-
Building and Implementing a Successful Information Security Policy
The purpose of this paper is to outline the strategies and managing processes behind implementing a successful Security Policy. There are recommendations for the creation of a Security Awareness Progr...
Provided By WindowsSecurity.com
-
Implementing IDS Structures
An Intrusion Detection System (IDS) structures are often created arbitrarily, together without any consideration of why they are needed. An IDS structure comprises the technology, personnel and policy...
Provided By QinetiQ
-
IP Spoofing: An Introduction
IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has com...
Provided By SecurityFocus
-
A Checklist for Network Security
Although networking has made the explosive growth of computer applications possible, the security liabilities it introduces are extremely problematic. In fact, a system's network connection is the pri...
Provided By Dell
-
Managing E-Business Security Challenges
Managing e-business security is a multifaceted challenge and requires the coordination of business policy and practice with appropriate technology. How can you be confident about the security built in...
Provided By Oracle
-
Public-Key Infrastructure Technology and Concepts
This paper is intended t help explain general PKI technology and concepts. For the sake of rientation,it also touches on policies and standards and on some of the new and exciting applications that wi...
Provided By Certicom
-
Seven Steps to Digital Signature Implementation
According to an Aberdeen Group market survey, 98% of the Global 2000 organizations will be using a Public Key Infrastructure (PKI) before 2003 for business-to-business electronic commerce and Internet...
Provided By Gradkell Systems
-
Network Security Policy: Best Practices White Paper
Without a security policy, the availability of your network can be compromised. The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requ...
Provided By Cisco Systems
-
Risk-Assessment Strategies
Risk management enables sound judgment when taking risks, and affords a level of contingency planning should a risk become a reality. Understanding the risks to company assets is the starting point of...
Provided By CMP Media
-
Five tips for dealing with rootkits
Rootkits are diverse, elusive, and difficult to get rid of. These basic pointers will help you combat this escalating threat.This download is also available as an entry in our Five Tips blog.
Provided By Jack Wallen
-
The Operational Context Diagram: How It Complements the System Context Diagram, and Helps You Design Technical Aspects of a System
For many years, application architects and analysts have used the System Context Diagram (SCD) as a powerful tool to share the high-level view of a system. The SCD provides only a functional view of t...
Provided By IBM
-
Minimise hack risk for financial institutions
No business is immune to hackers and, as Citigroup recently discovered, that includes financial institutions. Exploits from web services can be used in attacks, and the risk increases as more customer...
Provided By IBM
-
Windows Enterprise Data Protection with Symantec Backup Exec
Today's enterprises face a growing data protection challenge: how to optimize the backup and recovery of a volume of business-critical data that grows larger each and, in many cases, doubles each year...
Provided By Symantec
-
10 tips for defending your organization against pretexting attacks
All the security measures in the world aren't going to help you if your employees fall prey to a pretexter. Calvin Sun offers some insights to help you educate staff, implement effective policies, and...
Provided By Calvin Sun
-
Investigate attacks against your network with these open-source forensic tools
Even if you do everything right to secure your network, including implement security measures properly and maintain them vigilantly, no network is 100% secure. So, what do you do if, in spite of all y...
Provided By Prentice Hall PTR
-
Use network sniffers to defend your network against intrusion
Even properly secured and hardened systems that have been tested for security vulnerabilities will eventually come under attack or experience other security issues. Fortunately, tools are available (...
Provided By Prentice Hall PTR
-
Gain a Competitive Advantage by Aligning Your IT Infrastructure with Business Objectives
This paper looks at what IT Security means to your company and how services can assist in the battle against the threats.
Provided By IBM
-
VIPRE® Antivirus + Antispyware Free Trial
VIPRE Antivirus + Antispyware is high-performance antivirus software that doesn't slow down your PC like older, traditional security products. Old-style antivirus products have stacked layer upon la...
Provided By GFI Software, formerly Sunbelt Software
-
Rethinking analytics: The six steps to a truly social enterprise
Leading companies who are embracing the social enterprise model are moving towards an enterprise where 100% of their team has access to their data and the analytic tools they need to make strategic de...
Provided By SAP
-
Samsung Life Insurance Opens A New Horizon in Server Account Management with Quest® Authentication Services
Samsung Life Insurance had the critical need to overcome the security and management challenges of a heterogeneous IT infrastructure. To better protect customer privacy and more effectively manage its...
Provided By Dell Software
-
How to Boost Consumer Confidence in Your e-Commerce Web Site
Download this VeriSign Webcast in podcast format! Web-based businesses are facing a confidence crisis. Trust in site security is declining, with many consumers scaling back their online transactions ...
Provided By VeriSign
-
Test Data Privacy Is Critical ToMeet Compliances
Using customer, employee, or other confidential data straight from production for testing or developing applications violates data privacy laws and regulations and makes that data a soft target for at...
Provided By IBM
-
Simple, cost-effective messaging and collaboration for medium-sized businesses
Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is de...
Provided By IBM
-
Success Story: VCUHS
VCUHS IT management felt it imperative to standardize on a single vendor. "By then, IBM XIV was available," Johnson recalls. "We realized that it was either the best stuff since sliced bread or just s...
Provided By IBM
-
Demystifying Web 2.0: Opportunities, Threats, Defenses
Every new technology introduced into the enterprise brings with it new threats. Web 2.0 is no different, with threats including: Infection and downtime -- caused by viruses, worms, Trojans and spywar...
Provided By Clearswift
-
Essential Steps to E-mail Security: A Clearswift Best-Practice Guide
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, ther...
Provided By Clearswift
-
Clearswift's Web Appliance Allows M&C Saatchi to Balance Web Business Benefits With Security
M&C Saatchi is a global advertising agency renowned for its work with companies such as British Airways and KFC. It was founded in 1995 following the Saatchi brothers' departure from Saatchi & Saatchi...
Provided By Clearswift
-
SJ Berwin Llp Looks to Clearswift for Best in Class Email Security
SJ Berwin llp is a pan-european law firm with offices in Berlin, Brussels, Frankfurt, London, Madrid, Milan, Munich, Paris and Turin. The IT department in London has 45 employees and, as the head offi...
Provided By Clearswift
-
Understanding the Benefits of Windows 7 for Creating Efficient IT in Healthcare
Security is more important in the healthcare setting than many other industries. Breaches of patient data can result in HIPAA violations and government investigations. Breaches of system security can ...
Provided By Dell