Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Conducting Vulnerability Assessments

by InformationWeekJan 20, 2013

Vulnerability assessment is a key component in securing your network. It probably won't catch every vulnerability, but it can decrease your risk. We give you the lowdown on how to get the most out of VA--start by getting management on-board and mapping ou

Distributed Wireless Security Monitors: Time to Tighten The Wireless Net

by InformationWeekJan 20, 2013

We performed an exhaustive review of these specialized overlay systems that provide wire-side and wireless rogue-device detection, RF interference and intrusion-detection capabilities as well as user and performance monitoring in the 2.4-GHz and 5-GHz ran

Market Analysis: WLAN Security

by InformationWeekJan 20, 2013

Polls continue to show that the biggest impediment to enterprise WLAN adoption is security concerns. Face it, you can't make your WLAN bulletproof but you can build a strong defense strategy with the right tools. We examine the state of wireless security-

IM Security: RU Secure?

by InformationWeekJan 20, 2013

Your end users are going to use Instant Messaging systems -- with or without IT's blessing. Find out how to keep your network safe and secure, whether your IM app is public or private.

Enhanced Vulnerability Detection

by InformationWeekJan 20, 2013

A comprehensive security program should include a vulnerability assessment scanner, which can help decrease IDS false positives as well as with asset tracking. Here's what to look for.

Calpine Corp. Powers Up Data Logging: Plays It Safe and Stays Ahead of Auditors

by InformationWeekJan 20, 2013

The power company's infrastructure engineering manager shares his experiences on how the company set up its logging system and how it handles the massive amounts of data.

Review: Spyware Detectors

by InformationWeekJan 20, 2013

We examined seven enterprise-class anti-spyware suites. Our Editor's Choice won for its interface design, removal abilities and ease of deployment. But our second place entry, with its Web-based administration, is no slouch either.

Digital Signatures Are Key to E-Mail Security

by InformationWeekJan 20, 2013

Digital signatures based on third-party certificates secure your e-mail by verifying a sender's identity and the contents' authenticity. Here's how to set up the system.

Buyers guide: HIPAA: Let's Get Physical

by InformationWeekJan 20, 2013

It's time to get serious about satisfying HIPAA's physical-safeguard standards. We'll guide you in choosing hardware and software that satisfies those intricate requirements.

Review: Tape Encryption Devices: Host-based vs. Appliance

by InformationWeekJan 20, 2013

How will you be judged if one of your company's backup tapes falls into the wrong hands? We examine the strengths and weaknesses of a host-based tape encryption product and an inline appliance.



InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.