Whitepaper Posted by: dymar on 06/03/2018 10:26

SOPHOS – Stopping data leakage

Organizations are increasingly aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of …

Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – Secure Execution Engine

Traditional approaches to computer security can result in an uneven spread of security around a company’s networks and computers. Parts of the environment may be extremely well protected; others may not, and gaps in security measures can create vulnerabilities.With such a high proportion of mission critical systems connected to open systems such as the Internet, there are real possibilities that …

Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – A Prudent Approach

Large organizations continue to invest in a multitude of security technologies to protect both their IT infrastructures and their most valuable asset: confidential and private data. In spite of this effort, publicly-disclosed data breaches seem to be everyday occurrences. Why this disconnect? Can anything be done to improve confidential data security? PDF Files

Whitepaper Posted by: dymar on 06/03/2018 10:26

SOPHOS – Assessing endpoint security solutions

Evaluating the performance of competing endpoint security products is a time-consuming and daunting task. Enterprise decision-makers have to rely on independent competitive comparisons, performance benchmarks, and detection certifications, all covering different solutions and criteria, providing conflicting results. This paper highlights the pitfalls of simply looking at virus detection rates and investigates the effect of the rapidly developing IT environment and …

Page 2 of 41234