Physical Security Reports

Building the Right Mobile Security Toolkit
sponsored by TechTarget Security
EGUIDE: Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

TechTarget Security

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Achieving Disaster Recovery with Virtualization
sponsored by Dell Compellent
EBOOK: Implementing disaster recovery is both time consuming and costly. And as an IT pro, you are constantly on the look out for new strategies that can help make the process more cost-efficient. Learn how turning to virutalization can help simplify your disaster recovery initiatives and more.
Posted: 24 May 2011 | Published: 24 May 2011

Dell Compellent

Cloud-Based Data Protection
sponsored by Iron Mountain
DATA SHEET: To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Iron Mountain

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Unified network traffic monitoring for physical and VMware environments
sponsored by NetFort Technologies Ltd
WHITE PAPER: This white paper outlines an approach, based on monitoring network traffic, that delivers a unified view of network activity across virtual and physical components of the network.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

NetFort Technologies Ltd

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade

Achieving Financial and Functional Advantages in Connected Building Solutions with the Unified Physical Infrastructure℠(UPI)
sponsored by Panduit
WHITE PAPER: Read this paper to learn about being connected building planning requires tightly integrated, well-coordinated cross-functional communication and project management across four functional phases: organizational alignment, technology strategies, network design considerations, and financial analysis.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

The Unified Physical Infrastructure Approach
sponsored by Panduit
WHITE PAPER: In this paper, you'll learn that UPI-based solutions provide superior business value, helping customers keep pace with technology innovations and build a smarter, unified business foundation.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

Going Green While Reducing Operational Costs
sponsored by IBM
PRESENTATION TRANSCRIPT: Review this document based on an IBM/TechTarget Webcast entitled "Going Green While Reducing Operational Costs" to learn what experienced analyst Joe Clabby has to say about data centers and facilities.
Posted: 16 Jan 2009 | Published: 16 Jan 2009

IBM

Take a Holistic Approach to Business Driven Security
sponsored by IBM
WHITE PAPER: Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies