IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Read more...
 
E-mail

Document Process Management: The Compelling Case for an Integrated Lifecycle Strategy

IDC has found a direct correlation between effective document management and improved business performance. Yet recent research reveals that half of organizations rate their document process management processes as ineffective.
Read more...
 
E-mail

 Exposing and Taming Costs of Office Document-Handling

How does inefficient document management hurt your business?
Read more...
 
E-mail

 Document Security - a guide to securing your documents

This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Read more...
 
E-mail

eLearning security - the protection of elearning courses from intellectual property theft

NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Read more...
 
E-mail

Protect your document & intellectual property with Locklizard

In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Read more...
 
Page 6 of 7

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner