Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 13 Results

Sort by:

A Systematic, Comprehensive Approach to Information Security
July 6, 2005

Information security is a process of business risk management that must be performed on an ongoing basis. It is critical to take an approach to information security that examines the risks and s…

Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
May 14, 2013

This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…

Higher Education’s Top 10 Strategic Technologies for 2015
January 12, 2015

Related Resources ECAR Working Group Technology Spotlights — Quite a few survey respondents indicated they were unfamiliar with various technologies. In Q1 2015 the ECAR W…

Identity Management in Higher Education, 2011 Report
June 1, 2011

Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…

Identity Management in Higher Education: A Baseline Study
April 18, 2006

Abstract This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management techno…

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Information Technology Security: Governance, Strategy, and Practice in Higher Education
October 24, 2003

Abstract U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about inform…

Institutional Data Management in Higher Education
December 1, 2009

Abstract This 2009 ECAR study of institutional data management examines the policies and practices by which higher education institutions effectively collect, protect, and use digital informat…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Policy-Based Security and Enterprise Policy Management
April 5, 2004

"Policy-Based Security and Enterprise Policy Management" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special arrangement…