Security: Data Protection

PGP: Encryption Everywhere

PGP Corporation may have the handle on protecting sensitive data everywhere

Updated Security Information Manager Tackles Massive Event Logs

SIM adds real-time capabilities but compliance, not threats, stills drives this market

Why It’s Time for Network Access Control

Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.

NAC, Vista, and Your Security Strategy

We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.

Security: A Look Back and the Year Ahead

From smarter criminals to network access protection, IT is going to have its hands full in 2007.

Data Encryption: The Whole-Disk Option

For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.

Simple Steps to IM Management

IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.

How Security Breaches Impact Your Brand

New study shows disconnect between executives' understanding and action

Audits Address Overlooked Legacy Security

Guarding against external threats is important, but don’t overlook legacy systems security.

Real World Requirements for Unified Threat Management

Three key features IT should look for when shopping for a UTM solution.

Protecting Remote-Site Data

EdgeSecure makes it easier to protect data stored in remote locations.

Management Software Offers Slew of Security Perks

Protecting mission-critical data means looking at port and USB vulnerabilities.

The Cold, Hard Costs of Data Exposure

Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.

New “Security” Blanket for Developers

V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering

Securing Visitors with Guest-Access Controls

A defense contractor turns to admission controls to meet government requirements to secure national security information.

Two-Factor Authentication: The Single Sign-on Solution?

New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines

Q&A: Automating Security Controls for Compliance

Can companies use built-in ERP capabilities to better automate their IT controls?

SIM Software Aims for SMBs

One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.

CA Updates Mainframe Security Tools

Changes target regulatory compliance, auditing, and access controls

Q&A: The Quest (and Justification) for Trustworthy Code

How to evaluate the security of applications you build or buy, and justify those requirements to senior management.