Techworld

Netiq Whitepapers


Sort by: Date | Company | Title


Book 3 - The Practical Guide to Managing Risks
By NetIQ | 17/8/2011
Every organisation has a mission. Most, if not all, organisations use information technology (IT) to process their information in support of their missions and reaching their business goals. Managing risks associated with the information and supporting technologies is a critical factor in successful organisational mission realisation. Read on.
Download this now


Book 1 - The Practical Guide to Assuring Compliance
By NetIQ | 17/8/2011
In today’s integrated, regulated, litigated environment, it is necessary to provide assurance to customers, business partners, regulators, and sometimes even the courts that you have done your due diligence in securing your IT infrastructure. New and updated United States laws are increasingly making corporate management responsible for ensuring compliance, as companies face substantial fines and penalties for not doing so. Existing and emerging global security and privacy laws and regulations make keeping up with multinational compliance requirements imperative. Read on.
Download this now


Book 2 - The Practical Guide to Securing Assets
By NetIQ | 17/8/2011
Keeping your information technology (IT) systems and information secure in the face of constant changes in hardware, software, threats, and regulations can seem like an impossible task. You must constantly monitor and evaluate asset security controls effectiveness in addition to monitoring regulatory and contractual security requirement compliance. To be effective, you must implement IT controls in context with your entire organisation assets. Read on.
Download this now


Chapter 1: Threats and Challenges to Enterprise VoIP
By NetIQ | 11/8/2011
The convergence of voice and data networks has been evolving and gaining momentum for several years. Organizations that are implementing Voice over IP (VoIP) in an effort to cut communications costs or leverage the competitive advantage of integrated services shouldn’t overlook the security risks that arise as voice and data converge.
Download this now


Chapter 2: Protecting Enterprise VoIP Services
By NetIQ | 11/8/2011
The enterprise network is a complex system, and implementing VoIP brings a new level of complexity into the mix. In addition, security threats are real and many and assuring QoS delivery is a technical challenge. In deploying VoIP, you’re integrating voice technology with the critical data infrastructure. Building process and documentation controls into network operations provides the information about the corporate nervous system to manage a secure operating environment. You use this information to build a layered defense into the network. By gathering knowledge and applying it to defend the network in depth, you can deliver secure, reliable, available VoIP service across the enterprise.
Download this now


Chapter 3: Managing VoIP Performance, Availability, and Security
By NetIQ | 11/8/2011
When adding network features to support a secure VoIP network environment, the challenge is to achieve balance of informed technology choices with intelligent resource procurement and allocation. Chapter 2 identified several critical voice performance requirements—the most obvious being throughput, delay, and jitter.
Download this now


Book 3 - The Executive’s Guide to Managing Risks
By NetIQ | 11/8/2011
Every organisation has a mission. Most, if not all, organizations use information technology (IT) to process their information in support of their missions and reaching their business goals. Managing risks associated with the information and supporting technologies is a critical factor in successful organizational mission realisation.
Download this now


Book 2 - The Executive Guide to Securing Assets
By NetIQ | 11/8/2011
Keeping your information technology (IT) systems and information secure in the face of constant changes in hardware, software, threats, and regulations can seem like an impossible task. You must constantly monitor and evaluate asset security controls effectiveness in addition to monitoring regulatory and contractual security requirement compliance. To be effective, you must implement IT controls in context with your entire organization assets.
Download this now


Book 1 - The Executive’s Guide to Assuring Compliance
By NetIQ | 11/8/2011
In today’s integrated, regulated, litigated environment, it is necessary to provide assurance to customers, business partners, regulators, and sometimes even the courts that you have done your due diligence in securing your IT infrastructure. New and updated United States laws are increasingly making corporate management responsible for ensuring compliance, as companies face substantial fines and penalties for not doing so. Existing and emerging global security and privacy laws and regulations make keeping up with multinational compliance requirements imperative.
Download this now


Demonstrating Return on Investment with Enterprise-Class Identity and Access Management Technology
By NetIQ | 10/8/2011
End-to-end, secure identity and access management (IAM) within a distributed systems infrastructure is a key goal of most organizations today. This IDC White Paper demonstrates how enterprise customers can achieve significant ROI within their security and compliance infrastructures by implementing proven IAM technology.
Download this now

Twitter Feed

Featured Whitepapers