Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Centerfold: Olympic IT Team Seeks Gold Security Standard

by InformationWeekJan 20, 2013

The IT security team for the 2006 Winter Olympics learned from the previous Games that they need to filter and correlate their network alarms with more specificity--and that the insider threat is greater than they imagined.


Priority No. 1: Data Protection

by InformationWeekJan 20, 2013

IT organizations have many priorities for the coming year, but none is as prominent as the effort to protect corporate data from disaster. We examine IT's approach to its top 2006 priority: data protection.


Survivor's Guide 2006: Security

by InformationWeekJan 20, 2013

As you prepare for 2006, you need compliance-driven products to ensure your company doesn't become the next security-breach headline. But don't be fooled by all the vendor hype.


Affordable IT: IDS Deconstructed

by InformationWeekJan 20, 2013

Find out how much protection to expect from an intrusion-detection system building your own--for free!


NWC Inc. RFI: Disaster-Recovery Service Providers

by InformationWeekJan 20, 2013

We invited a trio of disaster-recovery providers to submit plans forbacking up our fictional business. Each vendor has strengths, but one inparticular won our Editor's Choice award for its inclusion of dedicated servers.


How To: Setting Up Active Directory Group Policies

by InformationWeekJan 20, 2013

AD's Group Policy lets you set up and control exactly how users andcomputers operate so you can easily institute changes and controls -- just besure you test and document it.


Tech U: Taming the Masses

by InformationWeekJan 20, 2013

Implementing security policies in an unregulated user population posesunique challenges. We look at innovative -- and inexpensive -- technologies someschools have employed.


Market Analysis: Web Application Firewalls

by InformationWeekJan 20, 2013

As more organizations move applications to the Web, they must defend anincreasingly tangled environment full of security holes. A relatively new breedof security watchdog, Web application firewalls use deep-packet inspection toreveal the inner workings of


Review: Web Application Firewalls

by InformationWeekJan 20, 2013

Web application firewalls block stealth attacks at Layer 7. We put fourof these appliances to the test. While all performed admirably, one handilyoutgunned its rivals thanks in part to an intuitive interface and comprehensivepolicy development. Find out w


Market Analysis: Security Information Management

by InformationWeekJan 20, 2013

The amount of threat data to be managed is growing. Fortunately, a well-planned SIM strategy can help you make sense of the deluge. We analyze the often confusing and complex security information management market.


SUBTOPICS:

InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.