What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Upcoming Webcasts

  • Big Data Marries End User Behavior – Mitigate the Insider Threat

    Join us to hear from Vice President and Research Fellow, IT Security and IT GRC, Derek E Brink as he presents his white paper about the insider threat, 3 activities to worry about, 5 ways they’re allowed to happen and what to do about it. He will be joined by Raytheon’s Director of Insider Threat Strategies, Michael Crouse, who will share over a decade of lessons learned regarding insider threat solutions. 10/09/2014

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies. 10/02/2014

Whitepapers

  • 5 Hybrid Cloud Starting Points

    Did you know that more than 50% of organizations are already using or planning a move to hybrid cloud? And that these same IT leaders expect to double their hybrid cloud budget over the next two years? VMware customers are seamlessly extending their on-premises data center built on the trusted foundation of VMware vSphere® to hybrid cloud. Take a look at the top five most common ways you can get started with hybrid cloud migration within your organization.

  • Detailed Mapping of Vormetric Data Security Platform Controls to NIST 800-53 Requirements

    Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.

  • All About Self-Encrypting Drives

    With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.

  • Effects of Unexpected Power Interruptions on Embedded Flash Media

    Use of NAND flash storage continues to proliferate throughout many industrial segments and applications due to declining costs per gigabyte, high performance, and low power requirements. However, one of the main challenges of current NAND flash technology is its susceptibility to data corruption during unexpected power loss. This white paper seeks to explain the specific effects of unexpected power failure on flash media, as well as highlight “best practices” for mitigating data corruption as a result of power loss.

  • Government Cloud: A New Era in Collaboration