Headed for a big meeting at a hotel or other offsite venue? Security is either going to help everything run smoothly, or be seen as the department that makes everything more complicated. Here are tips for protecting confidential presentations, employees, assets and more at any offsite meeting. William Besse, Vice President of Consulting and Investigations with security firm Andrews International, and physical security consultant Dan Finger provided their suggestions.
Joan Goodchild, Senior Editor , CSO, February 01, 2012
While in the process of separating from its parent company, a US$1.6 billion global hospitality company turned to Protiviti to analyze, plan and design effective and efficient identity management processes and supporting solutions.
In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence point for other endpoint management and control functions.
The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing the need to combine dynamic and static testing capabilities.
This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program's maturity.
Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
As bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. Is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?
Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.
Deploy SAP HANA� fast and with low risk. VCE brings together all of the necessary components for SAP HANA� into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes.