Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2010

    Deep Dive Into Endpoint Security With Check Point WebCheck

    The attendee will learn how Check Point WebCheck browser virtualization protects endpoints from the growing threat of drive-by downloads and gain a behind the scenes understanding of how the technology works.

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Make a Quantum Leap With Check Point Endpoint Security

    As threat complexity has increased in recent years, so have the challenges of combating these threats. At the same time, users continue to demand uninterrupted performance. IT organizations are being asked to provide the highest level of security without disrupting connectivity or making the user experience more complicated. Check Point...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Check Point IPS Software Blade: Changing the Face of IPS

    The historical standard for IPS security is to deploy a full physical layer of IPS appliances complete with an independent management component on a dedicated management server. The full processing power of dedicated HW appliances was required to support the intense processing requirements for IPS analysis. The IPS SW Blade...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Check Point Software Blade Architecture and Revolutionary IPS Software Blade

    Protecting networks against today's constantly evolving threat environment has never been more challenging. Infrastructure, connectivity and performance requirements keep growing. New and varied threats are leading to more security vendors, point-products and complexity, while IT teams are under increasing pressure to reduce costs and complexity, and do more with existing...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Seamlessly Integrate IPS Into Your Firewall

    Intrusion Prevention Systems (IPS) is a de facto standard in today's network security architecture. The new Check Point IPS Software Blade allows to easily and seamlessly integrate full IPS capabilities into the firewall - while delivering the industry's highest performance, the best threat coverage, and the best total security value...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    The NEW IPS: A Technical Discussion

    The attendee will learn about the new Check Point IPS Software Blade! This NEW IPS Blade provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. It delivers the industry's highest performing security gateway, the industry's best threat coverage, and gives the best total security...

    Provided By Check Point Software Technologies

  • White Papers // Jan 2010

    On the Potential of Limitation-Oriented Malware Detection and Prevention Techniques on Mobile Phones

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

    Provided By Singapore Management University

  • Case Studies // Jan 2010

    Ingram Micro Selects Application Delivery Solution

    Ingram Micro the world's largest technology distributor and a leading technology sales, marketing, and logistics company, wanted to try Cisco's Application Control Engine (ACE) modules that were already deployed in Ingram's network infrastructure into the legacy and IR networks. Ingram Micro had one data center that functions as the legacy...

    Provided By Cisco Systems

  • White Papers // Jan 2010

    Network Design Approaching a Secure and Practical Network

    The notion of writing this paper is to discuss in detail about network security and various threats it is exposed to while connecting computer systems with Internet at home and offices. This paper is a discussion of a small and complete network with proper reasoning behind all decisions and variations...

    Provided By Trumpet Power

  • Case Studies // Jan 2010

    G4S Security Systems Case Study: West Midlands Police

    West Midlands Police is the first organization in the world to use a newly developed and highly sophisticated integrated Physical and Logical solution comprising the Lenel On Guard and Imprivata OneSign solutions integrated with Smart card technology. Disciplines of physical and logical access security have been prominent issues for Police...

    Provided By G4S Security Systems

  • Case Studies // Jan 2010

    G4S Security Systems Case Study: Security for Schools - Merseyside City Learning Centres

    G4S Security Systems has expertise in providing security systems in the public sector for a wide variety of organizations and institutions from government departments through to hospitals and schools. They are also accredited by NACOSS, BSIA, EXOR and Constructionline who provide the assurance for its high standards. The need for...

    Provided By G4S Security Systems

  • Case Studies // Jan 2010

    G4S Security Systems Case Study: Vanco

    The world's fastest growing virtual network operator Vanco commissioned G4S Security Systems to install a networked security system across their Global Offices. Vanco's reliance on G4S Security Systems was strongly aligned on its knowledge and expertise in networked and integrated security systems. Founded in 1988, Vanco is a truly global...

    Provided By G4S Security Systems

  • Case Studies // Jan 2010

    G4S Security Systems Case Study: DTS

    Specializing in the field of Pre Retailing Clothing Sector, DTS Logistics Plc is one of the United Kingdom's leading garment logistics companies. The company was established by Michael Daly over 24 years ago and it presently handles over 120 million hanging and 100 million boxed units per annum with 160...

    Provided By G4S Security Systems

  • Case Studies // Jan 2010

    G4S Security Systems Case Study: Salisbury Health Authority

    Salisbury Health Authority came to G4S Security Systems seeking a system that would fulfill their total security needs and thus protecting all the people using the hospital. Salisbury Health Authority Hospitals are not prisons, and security is not the first thing on the minds of hospital staff. They are rightly...

    Provided By G4S Security Systems

  • Case Studies // Jan 2010

    Automatic Redundant Firewall Failover

    In this case study, the client was a large financial institution with an international private routed network. They required all users and networks which were not up to corporate security standards to be isolated by firewalls. One of the problems was that only two modes of access were allowed- firewall...

    Provided By Networking Unlimited

  • White Papers // Jan 2010

    Cargo And Freight Agents

    Cargo and freight agents arrange for and track incoming and outgoing cargo and freight shipments in airline, train, or trucking terminals or on shipping docks. Many jobs are entry level and do not require more than a high school diploma. Employers, however, prefer to hire those familiar with computers. Typing,...

    Provided By CollegeGrad.com

  • White Papers // Jan 2010

    How To Become A Marine Architect

    A marine architect is an architect who examines and plans the construction of docks, piers, naval vessels, and other watercraft. Marine architects review local marine and sea floor conditions to determine construction needs to ensure the project will sustain for a long period of time. To enter this field, you...

    Provided By How To Do Things

  • Webcasts // Jan 2010

    GTS Service Management

    This service management flash demo from GTS takes you through the overall service management landscape, client success stories, the GTS Service Management portfolio, benefits as outlined by industry analysts, and reasons to choose IBM. This demo is both self-running and interactive, so clients can click on sections that most interest...

    Provided By IBM

  • Webcasts // Jan 2010

    Storage ISM JAM: How Unified Recovery Management Can Cut Your Costs and Improve Service Levels

    Protecting and ensuring recoverability of data across today's diverse and distributed enterprises can be complex and costly, and usually involves deploying point solutions from several vendors. Taking a more comprehensive, unified approach to managing data - recovering any data, anywhere in the organization, from laptop to mainframe, from a single...

    Provided By IBM

  • White Papers // Jan 2010

    Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

    Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure...

    Provided By Websense

  • White Papers // Jan 2010

    Portable and Efficient Continuous Data Protection for Network File Servers

    Continuous Data Protection (CDP) is a critical building block that quickly repairs damage to a file system due to malicious attacks or innocent human errors. This paper describes a user-level continuous data protection architecture that is both efficient and portable, and thus completely eliminates barriers such as performance overhead and...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Photographer Career Description

    Photography entails much more than merely taking photographs. The work of photographers contains two basic elements namely the taking of pictures and the development of photographs until the desired quality is obtained. Prospective photographers must have organizational and business skills in order to be successful. They must be able to...

    Provided By Evolve-IT

  • White Papers // Jan 2010

    Personal Trainer Career Description

    A fitness trainer or the precise function of a physical trainer is to ensure that his or her trainee acquires the pre-determined physical attributes. People cherish such dreams and aspirations not only to feel fit and fine, but also to feel good. It has been proved that keeping fit is...

    Provided By Evolve-IT

  • White Papers // Jan 2010

    Lecturer Career Description

    Lecturers facilitate learning and provide tuition and guidance to students on a tertiary level of education, in a specialized field. A good intellect and an interest in a specific field of study, as well as a scientific orientation is required. As lecturers mostly work with the youth, it is essential...

    Provided By Evolve-IT

  • Case Studies // Jan 2010

    Sacramento County Department of Human Assistance Simplifies Backup and Recovery

    The Sacramento County Department of Human Assistance (DHA) helps people make the transition from public assistance to independence through employment, housing, healthcare, transportation, education, and childcare programs. The company's challenge was to complete backups within allocated time windows, improve speed and reliability of data recovery and reduce storage administration costs...

    Provided By NetApp

  • White Papers // Jan 2010

    The Concise Guide to E-Discovery

    E-discovery capabilities are no longer an option - they are a critical "must have" capability that will enable organizations to respond to legal actions and be much more proactive about how legal actions, regulatory audits and related activities are managed. New statutes at all levels of government focused on ESI,...

    Provided By Google

  • Webcasts // Jan 2010

    What, Why, and How of Application Security

    Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how...

    Provided By IBM

  • Webcasts // Jan 2010

    Removing insecurity from outsourced development

    Especially in tough economic times or where resources with requisite security skills are few, companies turn towards outsourcing for software development. Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.

    Provided By IBM

  • Webcasts // Jan 2010

    New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection

    Newly released research reveals that while C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, there is a lack of confidence in the ability to safeguard sensitive information. The Business Case for Data Protection was conducted by Ponemon Institute and sponsored...

    Provided By IBM

  • Case Studies // Jan 2010

    Case Study: Raid 5EE Data Recovery (Part 1)

    This case study presents a paper on the Redundant Arrays of Inexpensive Disks (RAID) 5EE Data Recovery. The paper sheds some light on various types of disk arrays, their architectures and ways of data recovery. RAID was developed with the basic idea of combining multiple small, inexpensive disk drives into...

    Provided By SalvationDATA

  • Case Studies // Jan 2010

    On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study

    Data mining is defined as the process of discovering implicit, non trivial knowledge from large consolidated databases. This is done with the aim of using it to support tactical and strategic business decisions. During the last decade many studies have been undertaken in the field of data mining. Though, much...

    Provided By University of Maryland

  • Case Studies // Jan 2010

    Teaching Hospital Embraces Cutting-Edge Technology

    A large academic medical center in California wanted to implement a Web-based image distribution system to improve access to radiological information for its patients across the entire medical center. At the time, it was making use of film-based radiology system along with Picture Archive Communication System (PACS), which were presenting...

    Provided By Deloitte LLP

  • Case Studies // Jan 2010

    Code-Red: A Case Study on the Spread and Victims of an Internet Worm

    On July 18, 2001, Code-Red (CRv2) worm took less than 14 hours to infect more than 359,000 internet connected computers, resulting in damage worth more than $2.6 billion. The case study tries to study the causes, impact and the safeguards against such attacks. Under this paper, a step by step...

    Provided By University of California

  • Case Studies // Jan 2010

    EBay - ECommerce Platform a Case Study in Scalability

    This case study speaks about the search and trading platform of eBay, an eCommerce giant. The company employs a vast multitude of platforms including PayPal and Skype. Most of these platforms have been obtained through acquisitions. Therefore, there is a risk of mismatch between these platforms. However, the paper researches...

    Provided By McGill University

  • Case Studies // Jan 2010

    Avg and Watchguard Partnership to Deliver a No-Compromise Gateway Anti-Virus Solution

    In computer systems worldwide, viruses and other forms of malware are among the leading causes of lost data, corrupted PCs, damaged applications, and loss of productivity. WatchGuard Technologies has been a leader of advanced technology business security solutions since 1996. It has successfully provided mission-critical protection to thousands of businesses...

    Provided By AVG Technologies

  • Case Studies // Jan 2010

    Kaspersky Anti-Virus Protects Grupa Remontowa SA

    A leader among European ship repair yards, Grupa Remontowa SA is a capital group concentrated around Gdansk Shipyard. Grupa is a major player on the world market which specializes in ship repairs and conversions, the design and construction of new ships, offshore units and steel structures. Previously, they used antivirus...

    Provided By Kaspersky Lab

  • Case Studies // Jan 2010

    Kaspersky Anti-Virus Safeguards Dutch Automobile Sales

    It was becoming difficult for Van Tilburg-Bastianen to find an antivirus solution that offered high detection rates, protection from spyware, as well as central administrative tools at no additional costs. Van Tilburg-Bastianen is a large automotive dealer of Volkswagens, Audis and DAF trucks based in Netherland. The problems of this...

    Provided By Kaspersky Lab

  • White Papers // Jan 2010

    20 Success Tips For New Managers

    Whether one has just been promoted to manager or is joining a new department, one needs to be able to adapt smoothly to the new position. The author suggests proven tips and strategies to make it through the transition successfully. Meet with your new boss as early as possible to...

    Provided By Executive Business Advisers

  • White Papers // Jan 2010

    Improved Port Knocking With Strong Authentication

    Sometimes, it becomes necessary to let only the authorized external users access the open ports whereas closed ports may be accessible to all. The paper seeks to investigate various methods of authentication so as to keep data secure. It specifically focuses on 'Port Knocking' method and the procedure to implement...

    Provided By University of Calgary

  • White Papers // Jan 2010

    Critical Qualities In Successful Managers

    Successful people in business management always seem to share certain key characteristics. The paper contains expert emphasized eight qualities when consulting with management teams. Some of the qualities are "Dependable" - Successful people have good follow through. "Flexible" - They are not afraid of new ideas or risks. A leader...

    Provided By Executive Business Advisers