102 Documents sorted by
Google Recaptcha Anywhere Module

Google Recaptcha Anywhere Module

Guide
30

Maximum protection against spammers and bots with the help of latest from Google Labs the invisible recaptcha. Details: https://addons.prestashop.com/en/front-office-features-prestashop-modules/27444-recaptcha-anywhere.html

Didactum Vibration Sensor

Didactum Vibration Sensor

White Paper, Presentation, Guide
17

The vibration detector was developed specifically for the Didactum high-end monitoring systems and is used to detect shocks and vibrations. Shaking and drilling on surfaces are recognized by this vibration detector and reported immediately to the network enabled Didactu read more

Didactum Smoke Detector

Didactum Smoke Detector

White Paper, Presentation, Guide
18

For the early detection of smoke and fire this smoke sensor should be installed on the ceiling of your infrastructures being monitored. You can also easily install this smoke detection sensor in server your cabinets and enclosures. No additional battery is required due read more

Didactum Monitoring System 500 II

Didactum Monitoring System 500 II

White Paper, Presentation, Guide
20

With Didactum`s new Monitoring System 500 II you get a proven monitoring solution to protect your mission-critical facilities and remote sites. This monitoring device is applicable across sectors and suitable for monitoring of sensitive IT infrastructure (server room / read more

From route hijacking to RPKI: How vulnerable is the Internet?

From route hijacking to RPKI: How vulnerable is the Internet?

Presentation
500 4 1

Trust is an important aspect of our daily actions on the Internet. Trust model discussions often focus on endpoints or even venture into TCP/IP and DNS, but rarely do they consider the important role BGP plays. BGP provides distributed control over core decisions, such read more

Hash:
Advanced Analytical Tools

Advanced Analytical Tools

Infographic
50

We created six advanced analytic tools based on the methods the Intelligence Community uses to defend the United States against terrorist and cyber attacks. The tools were developed by a former CIA Senior Analyst who earned a National Intelligence Award and received sen read more

Hash:
40-POINT CHECKLIST FOR A SUCCESSFUL HTTP TO HTTPS MIGRATION

40-POINT CHECKLIST FOR A SUCCESSFUL HTTP TO HTTPS MIGRATION

Checklist
61

Google recognized ‘Https’ as an important ranking signal on August 6, 2014. Since then, many webmasters are shifting to the Https version of their website; and this exodus seems to be heading in the right direction with Ecommerce websites leading from the front. As e-re read more

PROCESSING

SEC 410 Week 4 DQ 1 (UOP)/ sec410dotcom

Article
35

For more course tutorials visit www.sec410.com How can access control to offices, storage rooms, and secure areas in buildings be determined? What improvements may be made to secure these areas?(200-300 words)

Hash:
Secondary Approval - Two Person Rule

Secondary Approval - Two Person Rule

Article
100

Enterprises increasingly seek to virtualize their mission critical workloads. Yet, simultaneously, they must monitor and control VMware privileged user access to virtual machines (VMs) in order to ensure the security and regulatory compliance of their Tier 1 application read more

McKesson Case Study

McKesson Case Study

Case Study
100

As it prepared to build its OneCloud infrastructure, McKesson conducted a security audit, turning up three primary compliance and security concerns: Shared local administrator accounts, Overly broad administrator access, and ESXI security hardening compliance. HyTrust C read more

McAfee Business Brief

McAfee Business Brief

Report
100

Virtualizing tier 1 and compliance workloads presents new and daunting security challenges. As a result, virtualization initiatives are losing momentum, and some have outright stalled. The governance, security, and compliance needs of critical applications are substanti read more

HIPAA/HITECH Compliant in the Cloud

HIPAA/HITECH Compliant in the Cloud

Article
100

IT organizations are only beginning to understand that virtualization has implications that traditional security and compliance measures don’t account for. They’re discovering that the security and audit features of the VMware platform, while usually sufficient for lowe read more

HyTrust DataControl

HyTrust DataControl

Report, Article
97

HyTrust DataControl provides encryption with key management, delivering a data protection solution that enables zero downtime rekeying while remaining fast to deploy and easy to use. Addressing both compliance and security requirements, DataControl drives operational ef read more

Compliance Made Easy

Compliance Made Easy

Article
61

The powerful combination of vRealize Air Compliance and HyTrust CloudControl and DataControl enables organizations to monitor their virtual infrastructure to reduce risks and maintain compliance. Autotrader found the solution helped them address the visibility, securit read more

UC Berkeley Case Study

UC Berkeley Case Study

Case Study
67

University of California Berkeley tackles the challenges of a growing virtualized data center and diverse, multiple clients. We’re ‘too big for our britches’ and lack a solid methodology for monitoring, securing, and maintaining our vSphere systems as we continue to exp read more

MOST ACTIVE SOURCES

Rand Muhtaseb
Hashdoc Content Review
ST
E
Donald Raggs
C
M
Priti Shetti
HyTrust
J
Cueblocks
Schlimmer Consulting
MB
C
SD
R
fireserv
Allan Parker
Search in: