 |
Guide available for Sarbanes-Oxley IT control objectives
|
|
ISACA is providing its membership with a free guide to enable them to understand the IT control objectives of the Sarbanes-Oxley regulations |
|
 |
Measuring success in threat management programmes
|
|
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement |
|
 |
Secure enterprise search capability in office documents
|
|
Spreadsheets, presentations and documents can be searched securely across an organisation giving access to valuable collective information assets using DatAnswers |
|
 |
Policy management software for maintaining compliance
|
|
Tripwire's enterprise policy management draws on main industry standards and regulations to reduce security exposures and ensure compliance |
|
 |
Managing The Social Impact of Least Privilege Security
|
|
Paul Kenyon, COO of Avecto explains how desktop lockdown doesn’t mean taking the personal out of PC |
|
 |
DatAdvantage Provides Pharma Company With User Access Control
|
|
A major pharmaceuticals company is using DatAdvantage from Varonis for the management and monitoring of file access activity in the organisation |
|
 |
Three Key Lessons of IT Risk Management
|
|
Brian Barnier of ISACA details three key lessons for the prevention of IT security incidents in the enterprise |
|
 |
Enterprise IT Governance Framework
|
|
|
|
 |
Secure File Sharing For Mobile Users
|
|
Accellion has entered an alliance to bring secure file sharing to enterprise mobile users |
|
 |
Improving Security With Automated Compliance
|
|
Tufin Technologies sheds light on the use of automated compliance audit software for improving organisational security |
|
 |
EU Legislation effect On US Data Protection
|
|
Varonis highlights data protection issues for the USA as a result of forthcoming legislation from the European Union |
|
 |
High Uptake For SharePoint Security Plug-In
|
|
Accellion has closed gaps in SharePoint Security with a plug-in designed for Microsoft's popular collaboration tool |
|
 |
Business Risk Profile Changes With IT Consumerisation
|
|
Cryptzone warns that as Android devices gain a hold on the market and commercial IT systems become more consumerised, access control policies need reviewing |
|
 |
Guide Available For Cloud Computing Governance
|
|
Enhancing value and managing risk in cloud computing implementations is the aim of a new guide available from ISACA on cloud governance |
|
 |
Heavy Consequences For NHS Data Loss
|
|
Secureworks comments on the NHS Data Loss reccommending a holistic view of IT security including data loss prevention to avoid such losses |
|
 |
Mainframe Database Activity Monitoring Partnership
|
|
Application Security has joined Neon Enterprise Software in alliance to deliver mainframe database activity monitoring to combat insider threat vulnerabilities in large enterprise environments |
|
 |
Using software to extend the security and integrity of corporate IT into the cloud
|
|
Corporate responsibility for the security and integrity of IT is increasingly a concern regardless of whether the IT resources are internal or external to the enterprise. As systems have become increasingly open, and remote access is now commonplace, users are continually presented with opportunitie |
|
 |
Synovus Bank tighten security and access controls through Novell Identity Manager
|
|
A multi-chartered financial services company with 30 different banks, Synovus Financial was looking to automate user provisioning and streamline access management. By using Novell Identity Manager and Novell Secure Login, Synovus has tightened security while vastly reducing IT costs. |
|
 |
Printing Company Alliances Reduce Costs On Card Printing
|
|
HID Global is extending relationships with secure card printing companies to develop means of reducing costs and enhancing environmental sustainability standards |
|
 |
TRUSTe EU Safe Harbour Seal Awarded To Brivo
|
|
Brivo adds to its credentials as a safe provider of Software-as-a-Service offerings with the addition of the TRUSTe EU Safe Harbour Seal as well as its existing SAS 70 credentials |
|
 |
Dell Creates Partnerships For Midsize Security Market
|
|
Juniper Networks and SecureWorks have entered into partnership with Dell to create a portfolio of security products that Dell will be offering to medium sized businesses |
|
 |
ISACA Calls For Annual Reports To Include Security Breach Data
|
|
Responding to calls for mandatory data breach reporting in the UK, ISACA believes that the reporting should be extended to shareholders and other parties through the use of financial reports as the communication vehicle |
|
 |
Latin American Security Report Examines UTM and VPN Uptake in the Region
|
|
The security services market in Latin America is examined in a Frost and Sullivan report available from Research and Markets |
|
 |
Enterprise Random Password Manager Prevents Privileged Access Abuse
|
|
Regulatory compliance and secure privileged access account credentials extended to ASP.NET web applications with Enterprise Random Password Manager from Lieberman Software |
|
 |
Compliance Reporting Simplification Using Windows Remote Management
|
|
Remote reporting using Avecto Privilege guard can be achieved for generating compliance reports across the enterprise |
|
 |
Desktop Degaussing Unit For Erasing Data Tapes
|
|
The Erase-O-Matic is now available from Data Devices International for de-magnetising computer backup tapes without the possibility for data recovery |
|
 |
Credant Technologies’ GOAT - or Glossary of Acronyms And Terminology
|
|
Sean Glynn of Credant Technologies sets out to cut through the IT Security Industry's jargon and explain what some of those acronyms really mean in the geek dictionary |
|
 |
Improved Compliance Management from Active Risk Manager
|
|
ARM from Strategic Thought brings compliance control management to the enterprise using web-based risk management software |
|
 |
IT Security Top Priority for Nearly Half of Surveyed companiestest
|
|
With three-quarters of companies suffering cyber attacks and losing money as a result, Sophos survey reveals increased tendency to invest in robust security measures to protect data and IT systems |
|
 |
Network compliance audit tool available from Intelliden
|
|
iAudit is a free cloud-based compliance tool for assessing network device compliance against various standard industry practices |
|
 |
Cloud storage included in latest ArchiveOne release
|
|
C2C has released ArchiveOne Enterprise bringing compliance, retention management and eDiscovery into one application |
|
 |
Implementing IAM, combining physical and logical access
|
|
Tony Ball, the Identity and Access Management Senior Vice President at HID Global explains the benefits of implementing IAM solutions in the enterprise and how to overcome the barriers |
|
 |
Security considerations in data banking
|
|
Peter Bauer of Mimecast examines Information Business 2.0 and what it means for enterprise data banking |
|
 |
US Commercial Data Security reaches crisis levels
|
|
With misplaced spending priorities, database audit failures and poor control over data protection, American businesses are losing their grip on data control |
|
 |
Profense Web Application Firewall price reduction
|
|
Companies can now improve website application protection and compliance with Profense by taking advantage of 50% price reduction |
|
 |
Central Policy Management for Privileged Accounts
|
|
The battle continues for managing privileged identities with Cyber-Ark expanding into the superuser access control market |
|
 |
Secure Unified Communications for SmartPhones
|
|
SmartPhone security application from Sipera Systems brings privacy compliant Unified Communications and VoIP capabilities to mobile users |
|
 |
IT Security specialist expands its offering with SecureWorks
|
|
Nebulas now offers security and consulting services under the SecureWorks brand including monitoring and intrusion detection |
|
 |
Privileged Identity Management for Oracle environments
|
|
Secure access control for Oracle included in Lieberman's Enterprise Random Password Manager |
|
 |
Partnership to generate improved compliance monitoring
|
|
ITC Global Security and ArcSight join forces to offer security and compliance management and monitoring for large organisations |
|
 |
Electronic trust solution for online banking
|
|
Secure eBanking solution from OpenTrust provides secure transaction capability for corporate and private banking users |
|
 |
Using compliance to gain business value
|
|
Lynn Collier of Hitachi Data Systems looks at the opportunities that exist as compliance regulations change and forward thinking companies view the challenge with strategic foresight |
|
 |
Verifi fingerprint reader compatibility with bioLock
|
|
Zvetco Biometrics joins forces with realtime to deliver bioLock software for deployment on SAP enterprise resource planning software using Verifi fingerprint biometric readers |
|
 |
Securing privileged identity white paper
|
|
Automated and manual methods of controlling privileged access are highlighted in four key steps in a white paper on securing privileged access released by Lieberman Software |
|
 |
Entry level DAT tape back up technology for small businesses
|
|
Tandberg is now offering its tape drives and media through the distribution channel providing entry level back up storage for small business users |
|
 |
Joint seminars on privileged identity management
|
|
Lieberman is jointly hosting a pair of seminars in California with Microsoft and Lumension on Privileged Identity Management and Data Protection |
|
 |
Increased US customer base for Skybox Security
|
|
Risk and compliance management specialist undergoes strong growth within the US market during the last 12 months |
|
 |
Comprehensive plug and play VoIP appliance
|
|
The UC-Sec 100 from Sipera Systems provides unified communications and VoIP security for smaller businesses in single plug and play appliance |
|
 |
Lumension joins unified compliance framework
|
|
Network Frontiers and Lumension join forces to create global compliance database |
|
 |
Landmark reached at archiving solution provider
|
|
C2C now has four million users of its archiving and retention solution for files and e-mail |
|