White Papers for International Standards Organization (ISO) 27002 (17799)White Papers > ISO 27002 (17799)
Listings 151 - 160 of 380:
File Integrity Monitoring: Secure Your Virtual and Physical IT Environments
Looking for a File Integrity Monitoring Solution? With the numerous servers, devices and applications organizations rely on to support their everyday business, outages and security breaches ...
Filling the Compliance Gap in Your Microsoft Environment
Is your Microsoft environment compliant? In his new Quest white paper “Filling the Compliance Gap in Your Microsoft Environment,” Windows Security expert Randy Franklin Smith examines the im...
Filtering the Spectrum of Internet Threats: Inappropriate Content, Spyware, IM, and P2P
Because of the proliferation of Web-based threats, you can no longer rely on basic firewalls as your sole network protection. Most firewall rules are based on the IP address and network port...
Four Steps to Disaster Recovery and Business Continuity using iSCSI
It’s a fact of business life – physical, natural, and digital disasters do occur, and they interrupt operations and impact revenue. Your level of preparation and planning will determine your...
From Chaos to Control: Mastering the Complexity of the Data Center
Running a data center has always been a challenging job, as any IT manager will attest. In most cases, data centers evolved on a project-by-project basis, and over time they have grown ever ...
Full Disk Encryption
Full Disk Encryption (FDE) has been hailed as the final word in Data-at-Rest (DAR) security by many in the industry, but some fail to recognize that encryption is only as secure as the authe...
Gartner Magic Quadrant for E-Mail Security Boundary
This Gartner Magic Quadrant analysis provides a snapshot of current conditions in the e-mail boundary security market and its most significant players. At present, there are numerous compani...
Gartner Magic Quadrant Secure Web Gateway, 2007
Blue Coat is one of the few vendors in this market that has proved its scalability and performance. Gartner Secure Web Gateway Magic Quadrant 2007.
Geolocation - Knowing Your Enemy
This paper addresses how Quova's customers are using IP geolocation technology to minimize fraudulent online orders, limit manual reviews, and reduce false positives by: Recognizing mismatc...
Getting the Message
Electronic messaging applications are mission-critical for most enterprises, yet securing them from threats and managing them to meet regulatory and compliance requirements have never ...
Copyright © 2007-2012 ComplianceHome.com. A SUPREMUS GROUP venture. All rights reserved.