Knowledge Base

Welcome to the Escalade IT knowledge base.  It is our goal to provide a wealth of up-to-date and useful IT security datasheets, whitepapers, podcasts, on-demand webinars and e-briefs to help you in your technology evaluations.  Should you wish to speak with a member of the Escalade IT sales team you can reach out to us from the Contact Us page or from any Solution Area page by clicking the "Request a Sales Presentation" button.  We look forward to working with you. 

Vendor: Accellion
Date of Publication: April 2011
Summary:

Today‟s business environment requires ad hoc and instantaneous sharing of information. Driven...

Vendor: Accellion
Date of Publication: January 2011
Summary:

To compete efficiently in today’s global economy, and to make the most of distributed teams,...

Vendor: NIST
Date of Publication: August 2011
Summary:

Introduction

An information system is composed of many components4 that can be...

Vendor: PCI Security Standards Council
Date of Publication: August 2011
Summary:

Objective

The purpose of this Information Supplement is to provide guidance for...

Vendor: Federal Trade Commission
Date of Publication: May 2011
Tags: DropBox, FTC
Summary:

Christopher Soghoian is a Washington, D.C. based Graduate Fellow at the Center for Applied...

Vendor: Independent Research by Google Employee Tavis Ormandy
Date of Publication: August 2011
Summary:

Abstract
Antivirus vendors often assert they must be protected from scrutiny and...

Vendor: FFIEC - Federal Financial Institutions Examination Council
Date of Publication: June 2011
Summary:

On October 12, 2005, the FFIEC agencies1 (Agencies) issued guidance entitled Authentication in...

Vendor: Trend Micro
Date of Publication: April 2010
Summary:

Without question, these new collaboration capabilities are valuable to business. Improved...

Vendor: Software Engineering Institute, Carnegie Mellon (CERT)
Date of Publication: June 2011
Summary:

A study conducted by the CERT® Program at Carnegie Mellon University’’s Software Engineering...

Vendor: Software Engineering Institute, Carnegie Mellon (CERT)
Date of Publication: February 2011
Tags: CERT
Summary:

This report models the approach a focused attacker would take in order to breach an...

Pages