-
Case Study: RSA® Key Manager With Application Encryption Helps Major Hotel Operator
11/23/2010
When consumers think about hotel security, they often think about door locks and safes. In general, consumers don’t think about how crucial it is for hotel operators to protect the credit card information they’re given. By RSA Security, Inc.
-
RSA® Key Manager With Application Encryption Helps Major Hotel Operator
11/23/2010
When consumers think about hotel security, they often think about door locks and safes. In general, consumers don’t think about how crucial it is for hotel operators to protect the credit card information they’re given. By RSA Security, Inc.
-
White Paper: The Future Of Borderless Network Security
11/23/2010
This white paper provides a brief overview of borderless networks, discussing why this transition is an inevitable outgrowth of current business and technology trends. It also addresses a critical question: if borderless networks are already evolving, how can they be secured? By Jon Oltsik
-
The Future Of Borderless Network Security
11/23/2010
This white paper provides a brief overview of borderless networks, discussing why this transition is an inevitable outgrowth of current business and technology trends. It also addresses a critical question: if borderless networks are already evolving, how can they be secured? By Jon Oltsik
-
Palisade Protects Bingham Memorial Hospital Against Data Loss
11/10/2010
Bingham Memorial Hospital, a rural healthcare provider in Blackfoot, Idaho, needed a simple solution for Data Loss Prevention (DLP). By Palisade Systems, Inc.
-
Case Study: Palisade Protects Bingham Memorial Hospital Against Data Loss
11/10/2010
Bingham Memorial Hospital, a rural healthcare provider in Blackfoot, Idaho, needed a simple solution for Data Loss Prevention (DLP). By Palisade Systems, Inc.
-
White Paper: Achieving The Right Balance Between Security Protection And Investment
10/18/2010
The Check Point Software Blade Architecture is the first and only security architecture that delivers total, flexible and manageable security to companies of any size. It enables organizations to easily and efficiently tailor their network security infrastructure to meet critical and targeted business security needs, all while maintaining network performance service level agreements (SLAs). By Check Point Software
-
Achieving The Right Balance Between Security Protection And Investment
10/18/2010
The Check Point Software Blade Architecture is the first and only security architecture that delivers total, flexible and manageable security to companies of any size. It enables organizations to easily and efficiently tailor their network security infrastructure to meet critical and targeted business security needs, all while maintaining network performance service level agreements (SLAs). By Check Point Software
-
Health System Keeps Spam Email Out, Patient Data In
10/13/2010
The WatchGuard XCS appliance replicated much of the older system’s filtering, making the latter system redundant. The team swapped out the old system for a pair of WatchGuard XCS systems (known as BSP800 systems at the time, roughly performance-equivalent to current XCS 970 models). By Watchguard
-
Case Study: Health System Keeps Spam Email Out, Patient Data In
10/13/2010
The WatchGuard XCS appliance replicated much of the older system’s filtering, making the latter system redundant. The team swapped out the old system for a pair of WatchGuard XCS systems (known as BSP800 systems at the time, roughly performance-equivalent to current XCS 970 models). By Watchguard