White Papers by Topic: Security

Resources available: 208

Comprehensive SMB Data Protection

Industry analyst firm Enterprise Management Associated looks at effective, low-cost disk-to-disk-to-tape technologies and data protection approaches.

A Comprehensive Framework for Securing Virtualized Data Centers

Understand the real need for security solutions that can address the reality of expanding virtualization.

Network Security with IP and DNS Reputation

Learn how HP TippingPoint IP and DNS reputation services can act as a first line of defense against the rapidly expanding sources of bad network traffic, including botnets, malware, phishing sites, and compromised hosts - saving your company time, money, and embarrassment.

Forrester - Your Enterprise Database Security Strategy 2010

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database security is knowing why you're protecting each database, which databases to protect, and how best to secure data against all types of threats.

Continuous Data Protection in IBM AIX and i5/OS Environments

A rewind button for applications, files and transactions? That's what continuous data protection (CDP) technology provides to managers of IBM AIX and i5/OS operating environments. CDP rapidly recovers accidentally deleted or otherwise corrupted data and provides many other valuable benefits.

Healthcare IT Managers: Protecting AIX Environments

The ability to deliver and assure optimum availability to clinical systems and data is critical to the success of healthcare organizations. As providers become increasingly dependent on electronic medical records and medical delivery technologies, they must keep those applications, databases and networks available and accessible-no matter what. This white paper shows how information availability solutions ensure the availability and accessibility of AIX data and applications, regardless of planned or unplanned interruptions.

Lowering Total Cost of Ownership With Hybrid Web Security

This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise.

A Buyers Guide to Data Loss Prevention Solutions

This guide provides a list of recommended features and capabilities for buyers to consider when purchasing a DLP solution. Buyers can also use this guide to develop requests for proposals, as well as to help differentiate one vendor's products from anoth...

Evaluating Security-as-a-Service (SaaS) Solutions

The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions - at a significantly lower cost - without compromising privacy and security.

Why Centralized Cloud Identity Management is Crucial for the Enterprise

Now that employees are leaving the relative safety of the firewall to use online SaaS applications, enterprises need to adjust the way they manage employee identities. This White Paper from Ping Identity addresses why we need to centralize employees' IDs across applications.

©1994-2014 Infoworld, Inc.