Home
 > search for

Featured Documents related to »  security and privacy

Data Security, Governance, and Privacy
To meet regulatory requirements such as the US Sarbanes-Oxley Act (SOX), IT managers are now receiving the board-level visibility and budgets required to

security and privacy  Security, Governance, and Privacy To meet regulatory requirements such as the US Sarbanes-Oxley Act (SOX), IT managers are now receiving the board-level visibility and budgets required to improve enterprise data security. For example, companies need secure and verifiable audit trails that track the activities of database administrators (DBAs) and other privileged insiders. But have you considered the seven essential elements of database security? Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security and privacy


HIPAA-Watch for Security Speeds Up Compliance Part One: Vendor and Product Information
HIPAA-Watch for Security is a tool designed to guide organizations through the risk analysis required by the Health Insurance Portability and Accountability Act

security and privacy  Relevant Technologies, a leading security research and advisory firm, evaluated HIPAA-Watch for Security to verify how well it performed in guiding organizations through the HIPAA security risk analysis process. Vendor Background and Information RiskWatch was founded in 1993 in Landover, Maryland (US) with the idea of automating risk assessment modeling for the Department of Defense. Founder, Caroline Hamilton, a statistical modeling expert, put together a prototype for a risk analysis tool and then Read More...
Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk

security and privacy  become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of government regulations aimed to ensure the confidentiality, integrity, and availability of many types of financial and health-related information is also increasing Read More...
Privacy Challenges for Data Providers
Ensuring the quality, accuracy, and security of customer data has never been more important than it is today. The growing potential for privacy breaches and

security and privacy  the quality, accuracy, and security of customer data has never been more important than it is today. The growing potential for privacy breaches and tighter compliance regulations have created unique challenges and responsibilities for many data providers. Here we discuss some of the key privacy issues surrounding data management, and how partnering with a provider of master data management (MDM) software can help. Read More...
Data Masking: Strengthening Data Privacy and Security
Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating

security and privacy  card industry (PCI) data security standard (DSS) and other compliance programs—and so can you. Read More...
Spire Security
Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise

security and privacy  Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More...
Driving the Need for Highly Effective Mail Server Security
Most companies have already invested in e-mail security. However, yesterday’s defenses may not be up to the challenge of tomorrow’s threats. Why? Because

security and privacy  approach to mail server security and protect yourself from malware attacks. Read More...
Outsourcing Security Part 1: Noting the Benefits
Without effective security, companies risk losing money and customer trust. With good security, companies have the power to maintain stakeholder value, customer

security and privacy  years experience in information security and information operations. McLendon joined AXENT, and subsequently Symantec through acquisition, after a distinguished career with the United States Air Force. As a retired colonel, he has a wealth of expertise and command experience in special operations, intelligence, and electronic warfare and information warfare. He has managed large, diverse and geographically separated organizations, with leadership responsibilities for more than 2,100 highly technical Read More...
Beyond Spam – Email Security in the Age of Blended Threats
Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet

security and privacy  an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence today, including botnets, phishing, malware, and smartphone attacks, and what to do about them. Read More...
New Market for Security Insurance
Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer

security and privacy  to pass a standard Security Vulnerability Assessment. This assessment should at the minimum look for: Information Gathering and Reconnaissance vulnerabilities File Transfer Vulnerabilities Hardware Peripheral Vulnerabilities Backdoors and Errant Configurations Messaging Holes Web, HTTP, and CGI Vulnerabilities Denial of Service Vulnerabilities Read More...
Malware Security Report
Learn how to protect your company in the VeriSign Malware Security Report.

security and privacy  Security Report Silent and unseen, malware can infect your servers and Web sites, destroy customer trust—and put your business at risk. And the problem is getting worse as cyber criminals use increasingly sophisticated techniques to spread malware through the Web. Learn how to protect your company in the VeriSign Malware Security Report . You'll learn about the methods cyber criminals use, how they attempt to profit at your expense—and how you can stop them. Protect your company from the Read More...
Best Practices for Deploying LAN Security and NAC
Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means

security and privacy  Practices for Deploying LAN Security and NAC Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business. Read More...
e-DMZ Security


security and privacy  DMZ Security Read More...
Malware Security Report: Protecting Your Business, Customers, and Bottom Line
Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line.

security and privacy  Security Report: Protecting Your Business, Customers, and Bottom Line Malware is malicious software designed to attack and damage your business. Defining malware is simple, protecting against it is not. Malware can piggyback undetected in e-mails, instant messages, Web sites, and peer-to-peer connections—no organization is safe. But you can defend against malware attacks. Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line . You'll learn how cyber Read More...
Selecting Your Hosted Security Service Provider: What Every IT Manager Needs to Know
Do-it-yourself (DIY) security can be daunting. It requires significant time, effort and expertise to maintain strong security while complying with information

security and privacy  organization. Also inquire about security audits and compliance regimes, including ISO 27001/27002, ISO 17799 and the American Institute of Certified Public Accountants (AICPA) SAS 70 Type II audits. Reference accounts: Learning about claimed capabilities from the provider is good, but hearing a customer confirm such claims is even better. Ask prospective providers for a list of reference accounts, then ask the references the same questions you ask the provider and cross-check the results. Customers may Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others