Aug 272010

This VeriSign guide will demystify the technology involved and give you all the information you need to make the best decision when considering your online security options.

Whether you're an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer, but it also protects people who visit your home, place of business or website.

It is important to understand the potential risks and then to make sure you are fully protected against them. With security technologies and online risks changing everyday, it is not always easy to stay abreast of the latest advancements.

 Posted by at 7:24 am
Aug 172010

Vulnerabilities in web applications are now the largest vector of enterprise security attacks.

Stories about exploits that compromise sensitive data frequently mention culprits such as "cross-site scripting," "SQL injection," and "buffer overflow." Vulnerabilities like these fall often outside the traditional expertise of network security managers.

To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security. The guide covers:

* typical web application vulnerabilities
* comparison of options for web application vulnerability detection
* QualysGuard Web Application Scanning solution

 Posted by at 1:41 pm
Aug 162010

Disaster Recovery (DR) is a critical component of IT and risk mitigation strategies, and compounded in difficulty by ever growing data volumes, distributed computing, and new technologies.

How can you get creative in protecting more data, recovering more swiftly, but also saving some money? Download this essential ESG white paper to learn about how WAN optimization can be a key enabling technology in accelerating DR and accelerating savings, too.

 Posted by at 9:34 am