Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......
Security
(1130)- Security Administration (561)
- End user/Client Security (210)
- Encryption (140)
- Cyberterror (99)
- Attacks/Breaches (364)
- Application Security (426)
- Antivirus (78)
- NAC (19)
- Perimeter Security (132)
- Privacy (208)
- Vulnerabilities and Threats (663)
- Storage Security (263)
- Intrusion Prevention (199)

Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
7 Ways IT Creates Security Breaches and How to Fix Them Right Now
[ Source: NETGEAR ]
October 2011-
Firewalls occupy a trusted position at the network's edge by examining traffic passing through packet by packet, and block anything their rules say looks suspicious. Those rules were, and still are, pretty simple keep hackers and malware from exploiting any of the thousands of protocols and ports available on any typical computer or business network. Today?s threats are more complex, move faster, and exploit more vulnerabilities than 1994-era technologies ever anticipated.
New ...
Delivering the Web Access Your Users Want with the Control You Need
[ Source: Blue Coat ]
November 2011-
The emergence of social media as the mainstream communications environment has driven business and personal usage of many web 2.0 applications including video, email, chatting, and blogging. This creates a business imperative to allow, but control, web 2.0 applications - most significantly social media usage.
In the current complex and dynamic web environment, achieving the required control of web access starts with an accurate, dynamic and granular content filtering database. Blue Coat WebFilter content filtering, ...
The evolution of quality management: security, privacy and accessibility
[ Source: IBM ]
November 2011-
Forward-thinking development organizations recognize that quality management does not begin and end with quality assurance (QA) testing. Requirements-driven quality has a proven return on investment (ROI) with reduced cycle times and reduced development costs. For the enterprises that view quality management as more than just functional and load testing, the next evolution is to extend this approach to security, privacy and accessibility. Quite simply, the evolution of quality management is to make your applications secure ...
Cloud Security: Securing and Controlling Data in the Cloud
[ Source: Vormetric ]
August 2011-
Moving sensitive data outside of the traditional enterprise security perimeter to the cloud raises significant security risks. Whether using Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), or Infrastructure-as-a-Service (IaaS), understanding the risks and overcoming the security barriers to cloud adoption is an enterprise imperative.
Gain vital insights on which cloud security approach meets your security objectives and what issues to consider before moving sensitive data into cloud environments like Amazon EC2 including:
• Security risks ...
The Business Case for Managed DDoS Protection
[ Source: Neustar UltraDNS ]
December 2011-
Discover how DDoS attacks are getting larger, more sophisticated and dangerous. Learn the risks to Internet infrastructure, revenues and brand equity. See how those risks multiply the more your business depends on the Web.
Find out why small and medium-sized businesses are in some ways even more threatened by DDoS attacks than larger enterprises. Get insight into the ways IT environments have changed - and why that can complicate your efforts to protect ...
Best Practice Log Management: Correlation is Key
[ Source: CorreLog ]
October 2011-
Today, collecting email data is a necessity for compliance standards, forensic analysis and managing end-user performance and availability. But making sense of the data is a challenge within itself. Collecting the data is only part of the equation and research and many shops are turning towards correlation which helps bring meaning to the massive amount of data collected. This white paper explains how to establish a systematic approach to identifying relationships (correlating!) between log data ...
Media Tablets in the Enterprise
[ Source: Dell & Intel ]
January 2012-
Technology analysts and journalists alike have been premature in proclaiming the death of the PC. Even in the empowered age of smartphones, netbooks, and tablets, the PC has a unique way of reinventing itself to satisfy user needs in the workplace.
In a survey of more than 1,700 information workers (iWorkers) in North America, notebooks, desktops, and smartphones were found to be "must-have" devices, while tablets, slates, and netbooks were relegated to "nice-to-have" status, ...
Endpoint Security and the iPad
[ Source: Solutionary ]
April 2012-
The iPad is essentially a laptop, with many of the same security concerns as any other computing device. This white paper examines endpoint security and the iPad from both its internal security protections, as well as some of the overall security concerns.
DDoS for Dummies
[ Source: Corero ]
October 2012-
A Distributed Denial of Service (DDoS) attack against your organization’s network and systems can bring your online business to a grinding halt, costing you hundreds of thousands – even millions – of dollars, ruining your brand, and driving away your customers.
Far too many organizations are ill-prepared to deal with the effects of DDoS attacks and other Internet security threats. They rely on traditional security devices including firewalls, intrusion prevention systems (IPS) and other ...
Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work
[ Source: AccelOps, Inc. ]
November 2012-
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Whether referring to security event management, security information management, log management systems, or more modern combined industry solutions, SIEM user requirements and operational considerations have evolved.
This eBook provides guidance to operationalize security and put the top 10 best SIEM practices to work, offering pertinent insights and details about how to ...
IBM Endpoint Manager: Reaping the Benefits of a Unified Approach to Security and IT Operations Management
[ Source: IBM ]
June 2012-
In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...
Establishing a Data-Centric Approach to Encryption
[ Source: Voltage Security ]
April 2012-
Many data breaches occur at companies that already have a data security policy in place. What is the problem? Typically, intrusion detection and other technologies designed to keep intruders out of your system are built to protect against previously known hacking strategies. This approach exposes your IT systems to great risk as new methods of intrusion are constantly being devised. Learn how to protect corporate data with a data-centric encryption strategy.
Protecting Against Advanced Malware and Targeted APT Attacks
[ Source: FireEye ]
February 2012-
Regain the upper hand on advanced targeted attacks. Learn how in a compelling new brief featuring Gartner research.
The cyber criminals are winning.
Today, more than 95 percent of businesses unknowingly host compromised endpoints. This is a direct result of advanced targeted attacks easily circumventing traditional IT security defenses - which can lead to theft of customer data, loss of valuable intellectual property, and irreparable damage to your brand. Discover what every ...
Best Practice Log Management: Correlation is Key
[ Source: CorreLog ]
October 2011-
Today, collecting email data is a necessity for compliance standards, forensic analysis and managing end-user performance and availability. But making sense of the data is a challenge within itself. Collecting the data is only part of the equation and research and many shops are turning towards correlation which helps bring meaning to the massive amount of data collected. This white paper explains how to establish a systematic approach to identifying relationships (correlating!) between log data ...
PCI DSS Compliance Demystified
[ Source: Dell ]
June 2011-
All companies that process, transmit or store credit card data must comply with PCI DSS v2.0. This white paper highlights the 12 requirements of PCI DSS and explains how one solution addresses all 12 requirements.
Discover how to implement effective controls to protect cardholder information and demonstrate provable compliance with one easy step.
Auditing Software Acts Like A Server Security Camera
[ Source: ObserveIT ]
January 2010-
ObserveIT auditing software acts like a security camera on your servers. It provides bulletproof video evidence of user sessions, significantly shortening investigation time. Every action performed by remote vendors, developers, sysadmins, business users or privileged users is recorded. Video recordings include mouse click, app usage and keystrokes. Each time a security event is unclear, simply replay the video, just as if you were looking over the user’s shoulder.
ObserveIT is the perfect ...
PCI-Compliant Cloud Reference Architecture authored by Cisco, Coalfire, HyTrust, Savvis and VMware
[ Source: HyTrust, Inc. ]
November 2010-
Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS).
Innovative technologies from Cisco, VMware, and HyTrust are used to implement the cloud architecture with a number of additional security controls to meet the intent of PCI DSS. The reference architecture was implemented in the Savvis lab and the team collaborated with Coalfire, which ...
Evaluating Managed File Transfer in the Cloud: What You Need to Know
[ Source: Ipswitch File Transfer ]
December 2012-
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs of each. And this decision does not need to be "either-or"; for many companies an enterprise solution for managing secure file transfer encompasses both cloud hosted and on-premise options.
This white paper from Osterman Research details advantages to consider for managing file transfer operations in the cloud, and ...
The State of DDoS Protection: Organizations Remain Unprepared for DDoS Attacks
[ Source: Neustar ]
December 2012-
Distributed denial-of-service (DDoS) attacks continue to grow in size, complexity and danger. Witness the recent wave of attacks on major U.S. banks, which knocked websites offline, angered customers and took a grave toll on brand reputations. The lessons of those attacks echo the findings of this report: Previously successful DDoS mitigation solutions no longer work.
UBM Tech conducted research with IT professionals who have suffered DDoS attacks. The drastic changes in attack ...
A New Breed of Information Security Leader: The Hyper-Connected Era and What It Means for CIOs and CISOs
[ Source: IBM ]
December 2012-
2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?
Consolidated Security Management for Mainframe Clouds
[ Source: IBM ]
December 2012-
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
How Does IBM Deliver Cloud Security
[ Source: IBM ]
December 2012-
Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualised environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and deprovisioning environment while experiencing the loss of ...
Intelligent Role Management for Improved Security and Compliance
[ Source: IBM ]
December 2012-
In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are overly complex and are not suited for business users. To find out how the integrated Role and Policy Modeler component of IBM Security Identity Manager ...
Close Encounters of the Third Kind
[ Source: IBM ]
December 2012-
This white paper presents the results of a research study on the prevalence of client-side JavaScript vulnerabilities, conducted by the IBM Security (formerly, IBM Rational) application security team. For this study, the researchers used IBM JavaScript Security Analyzer (JSA) technology, which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. This kind of analysis is superior to and more accurate than regular static ...
Your Organization Has Just Been Attacked by Malware - Now What?
[ Source: Sourcefire ]
December 2012-
Jumping the gun? Maybe. But odds are it will happen.
Be ready with your Advanced Malware Survival Kit.
Download our Incident Response Brief: 4 keys to effective malware response
From there, access:
• Videos: See the power of malware visibility and control from the network to end-devices
• Special Offer: 100 Free Seats of advanced malware protection
Download the Advanced Malware Survival Kit Now and be prepared before the next attack!
3 Strategies to Protect Endpoints from Risky Applications
[ Source: Dell KACE™ ]
November 2012-
Cyber criminals have started to look for greener pastures—namely among third-party applications. Reduce the risk profile of PC and server operating systems and protect endpoint security from risky applications. Read the white paper today.
Email As Part of a Business Continuity Strategy: Why always-on-business requires always-on-email
[ Source: mimecast ]
November 2012-
Few businesses could function without email, and email provides a critical coordination
tool during an outage, yet due to the cost and complexity of providing true email continuity many businesses do not have business continuity plans that protect email adequately.
Read why continuity and archiving services may prove more cost effective for email than high-availability clustering, especially when considered in the light of continued governance, risk mitigation and compliance.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite
