Wednesday, August 31, 2005

New White Paper Roundup: Federated Identity, Spyware, SSO, VPN's and more!

Dear SearchSecurity.com member,

Visit the SearchSecurity.com Research Library today and read our free
white papers.

1. Smartcard - Enabled Security Solutions
http://searchSecurity.com/r/0,,45173,00.htm?track=NL-261&ad=527221

2. SSL VPNs and the Lockdown Loophole
http://searchSecurity.com/r/0,,45171,00.htm?track=NL-261&ad=527221

3. Reducing Password Security Risks and Productivity Costs
http://searchSecurity.com/r/0,,45176,00.htm?track=NL-261&ad=527221

4. Buyer's Guide for Federated Identity
http://searchSecurity.com/r/0,,45178,00.htm?track=NL-261&ad=527221

5. Spyware Prevention: Internet Security Systems' Multi-layered
Approach to Stopping Information Theft
http://searchSecurity.com/r/0,,45179,00.htm?track=NL-261&ad=527221

6. HP Security Solutions for Business PCs: Flexible, end-to-end
security that aligns with your business needs
http://searchSecurity.com/r/0,,45181,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Smartcard - Enabled Security Solutions
Sponsored by: Siemens
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Read this white paper to understand the ROI argument for investing in
secure access smart card-based solutions in the enterprise. The paper
focuses on the ROI benefits of smart cards for both authenticating
users to IT networks and systems and controlling access to
facilities.

Download here:
http://searchSecurity.com/r/0,,45173,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SSL VPNs and the Lockdown Loophole
Sponsored by: Permeo Technologies
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SSL VPNs provide flexible and secure remote access to virtually all
of an enterprise's applications and computing resources. Today, it
has become common in IT environments to increasingly lockdown the
configurations of remote nodes - as well as local ones - to prevent
them from getting compromised.

Download this paper, to learn solutions that Mark Bouchard uses to
accommodate both of these important goals:
http://searchSecurity.com/r/0,,45171,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Reducing Password Security Risks and Productivity Costs
Sponsored by: Novell Inc.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Do away with the user's need to remember multiple passwords, while
enabling the implementation of strong password policies while
reducing over 90% of password security vulnerabilities. Learn how to
reduce password security risks and provide users secure single
sign-on.

Download here:
http://searchSecurity.com/r/0,,45176,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Buyer's Guide for Federated Identity
Sponsored by: Oracle Corporation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Federated identity delivers increased security and improved business
efficiencies for adopting organizations. This buyer's guide outlines
the key capabilities and features to look for when evaluating
federated identity solutions.

Download here:
http://searchSecurity.com/r/0,,45178,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Spyware Prevention: Internet Security Systems' Multi-layered Approach
to Stopping Information Theft
Sponsored by: Internet Security Systems, Inc.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Learn how spyware infiltrates and endangers organizations, and how to
establish a multi-layered security solution that will search and
destroy existing spyware and block installation and execution of
incoming spyware.

Download here:
http://searchSecurity.com/r/0,,45179,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HP Security Solutions for Business PCs: Flexible, end-to-end security
that aligns with your business needs
Sponsored by: HP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Learn how HP can help your company design, deploy, and manage stable
and robust security management practices to protect your data
integrity and the ongoing health of your network.

Download here:
http://searchSecurity.com/r/0,,45181,00.htm?track=NL-261&ad=527221

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEARCHSECURITY.COM RESEARCH LIBRARY
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Browse hundreds of white papers by author, keyword or topics.
Visit the SearchSecurity.com Research Library today:
http://SearchSecurity.com/whitepapers?track=NL-261&ad=527221

===================================================================
To subscribe to "Security Alert" go to:
http://searchSecurity.techtarget.com/tieredRegPage/1,,sid14_eid527221,00.html?track=NL-261&ad=527221&newsletters=951490

Not a SearchSecurity.com member? We'll activate your membership with
your subscription.
===================================================================

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

::::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::::
This e-newsletter is published by SearchSecurity.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "White Paper Alerts":

Go to unsubscribe: http://SearchSecurity.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=527221&track=NL-261

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494