Chapter

Information Security Hub – Page 8

EMC Documentum Security – A Comprehensive Overview

This whitepaper discusses how the reliance on electronic information increases the need for security and why it is especially important to ensure a secure enterprise content management infrastructure. It details the core security features of EMC documentum content Server, the central component of Documentum Enterprise content management platform, and enhances security available through Documentum Trusted Content Services

Understanding Cloud Security Challenges

This paper discusses that providing security for cloud environments that matches the levels found in internal data centers is essential for helping modern organizations compete and for allowing service providers to meet their customers’ needs. However, to match the levels of security that customers experience internally, service providers must make the proper investments in providing, proving and ensuring appropriate levels of security over time.

Introduction to Common Criteria Scheme (CCS)

This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS – an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?

Introduction to Cyber Forensics

This presentation provides an overview of cyber forensics – what is forensics? what is cyber forensics? who uses cyber forensics? what are the skills needed for cyber forensics?

Virtualization and Security

This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.

Enterprise Risk Assessment

This presentation discusses the evolving threats to systems, their "true impact" and enterprise risk assessment as a discipline to respond to them.

Security Risk Assessment

This paper discusses security risk analysis – what is security risk analysis? why perform a security risk assessment? how to conduct a security risk assessment? when to perform a security risk analysis?

CIO Portal