Security
197 papers availableSecure and managed file transfer In the era of regulatory compliance
– Safely and reliably exchanging electronic business information
April 2009More about:
A healthy prescription for secure and compliant file transfer
– Data security for healthcare organizations
April 2009More about:
Security compliance: ending the threat of weak user passwords for file transfer servers
– Don't let file transfer servers become the Achilles' heel of your network's security
April 2009More about:
Cashing in on banking security and compliance
– Deliver secure and managed end-to-end file transfer
April 2009More about:
Real time protection for Hyper-V
– Developing a strategy for virtual machine recovery
March 2009More about:
The ROI of Data Governance
– Seven ways your data governance program can help you save money
March 2009More about:
Security for mid-sized businesses
– How to avoid falling between two stools
Webcast: How to avoid falling between two stools.
March 2009More about:
Trend Micro threat management solution
– Discovering, mitigating, and managing threats in your internal network
February 2009More about:
Blocking malware in the cloud: Does it work?
– An independent analysis of Trend Micro's cloud-based Web Reputation technology
Reduce your malware related incidents and support calls by up to 75%
February 2009More about:
Cascadia Labs URL filtering and web security
The Trend Micro Smart Protection Network uses Web Reputation technology to block malicious URLs
February 2009More about:
Seven design requirements for web 2.0 threat prevention
– A new generation of multi-layered security
Learn more about seven design requirements for Web 2.0
February 2009More about:
TrustedSource: The next-generation reputation system for enterprise gateway security
– Creating an umbrella of multi-platform protection
Learn more about TrustedSource. Download the Whitepaper here
February 2009More about:
What?! My firewall is obsolete!? Three must-haves for a web 2.0 world
– How web 2.0 threats have rendered today's most popular security technology obsolete
Learn more about Web 2.0 and your firewall. Download the Whitepaper here
February 2009More about:
Explore
Pick a topic to learn more …Login / Register
in order to download ...Sign up for an account.
Most Popular
interesting to people like you …Disaster recovery virtualisation
Protecting production systems using VMware virtual infrastructure and Double-Take
More about:
Five steps to successful IT consolidation and virtualization
Experience the full benefits of IT consolidation
More about:
Planning for strategic investment in data quality
Want to pitch for more budget? Learn how to read your boss's mind
More about: