Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
A Guide to Email Regulatory Compliance
[ Source: Perimeter ]
August 2009-
Laws have been passed to more adequately secure private and sensitive information, many of them specifically requiring better email security. Secure your information exchange by acting on the essential tips provided in this whitepaper.
Beyond FTP: Securing And Managing File Transfers
[ Source: Linoma Software ]
August 2009-
Few managers realize the security and management risks that have blossomed in their organization with the prevalent use of FTP. This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
IronPort 2008 Internet Malware Trends Report
[ Source: IronPort Systems ]
November 2008-
In 2007, Storm burst onto the scene and rapidly spread. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily sophisticated. Storm and newer malware botnets that build on Storm’s strengths continue to affect and threaten Internet communication. To help explain the spread of Storm and current and future threats posed by similar malware, this report offers an examination of Storm and its history.
The Importance of Mobile Security
[ Source: Sprint ]
August 2008-
Sprint's head of mobile security, Mark Hasse, talks to Insurance and Technology about the role of security for mobile workers. Especially as Insurance agents and field workers take new mobile platforms and laptops out of the enterprise, there are concerns about losing or compromising sensitive financial and customer information. Hasse talks about the need for awareness, the important topic of securing data at rest, and the encryption solution.
Advances in Endpoint Data Security
[ Source: Credant Technologies ]
February 2008-
Data security has evolved beyond simply securing "bits on disks". To ensure data protection in today's dynamic IT environment, leading analysts recommend that security protects what matters most — the data. This requires a solution with a single, integrated security architecture and a data-centric, policy-based encryption approach that can be consistently enforced wherever the data resides — across heterogeneous
endpoint device types, operating system platforms, and end users. The paradigm must shift from Full Disk Encryption to ...
EMC Documentum Information Rights Management Extends Security and Control
[ Source: EMC ]
October 2008-
The EMC Documentum architecture for information rights management (IRM) helps global companies and government agencies actively control, secure, and track sensitive information, wherever it resides, beyond delivery to and access by authorized users. The system uses strong industry-standard cryptography combined with a unique client-server architecture. Documentum IRM Services’family of client applications or plug-ins works with a common policy server to secure and control electronic information. This white paper provides an overview of the technical ...
Knowledge-based Authentication Is Not Enough
[ Source: Global Crypto ]
February 2009-
Everyday millions of consumers login to financial institutions, brokerage accounts, trading platforms and other web sites using Knowledge Based Authentication (KBA) solutions. Typically these solutions ask users to respond to questions selected by the user during the web site’s initial enrollment process.
The assumption is only that particular user knows the correct answer to these common questions. But the reality is these solutions tend to create user confusion and do little to ...
The Latest Advancements in SSL Technology
[ Source: VeriSign ]
March 2008-
Secure Sockets Layer (SSL) is the World Standard for Web Security. SSL technology
confronts the potential problems of unauthorized viewing of confidential information,
data manipulation, data hijacking, phishing, and other insidious Web site scams by
encrypting sensitive data so that only authorized recipients can read it. In addition to
preventing tampering with sensitive information, SSL helps provide your Web site’s users
with the assurance of having accessed a valid Web site. Support for SSL ...
Balancing Risk and Productivity for Mobile Insurance Workers
[ Source: Sprint ]
August 2008-
Mobile services, like 3G, have made it possible for Insurance workers to remotely access vital information while they are out in the field, but this also introduces a great deal of risk. Mark Hasse, who heads up mobile security for Sprint, demonstrates the SprintSecure Guardian connection card at ACORD.
New Web Threats for 2009
[ Source: MessageLabs, Symantec Hosted Services ]
December 2010-
Email threats such as spam are well known, but there's another major entry point into your network, the Web! As companies have become more adept at stopping email threats, cyber-criminals have discovered new ways to infiltrate corporate networks through the Internet. Uncover the newest Web-based threats targeting businesses and learn how to stop them before they can disrupt your business. This whitepaper discusses how cyber-criminals use converged threats (email and web combined attacks) to manipulate ...
Three Steps to Mitigate Mobile Security Risks
[ Source: Rapid7 ]
November 2012-
Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices present to their corporate data.
This white paper highlights key mobile security risks and describes how pervasive they are based on data from ...
Reducing PCI DSS Scope: The Gateway Approach
[ Source: Intel ]
October 2012-
This White Paper discusses how you can generate tokens that replace credit card numbers with surrogates, removing systems from PCI DSS "Scope" -- which include any network components that are the primary focus of PCI DSS regulation, compliance and assessment.
Tokenization Buyer's Guide
[ Source: Intel ]
October 2012-
PCI DSS expert and QSA Walter Conway takes you on a deep dive tour of tokenization techniques and their merits. He also demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
3 Core PCI-DSS Tokenization Models: Choosing the right PCI-DSS Strategy
[ Source: Intel ]
October 2012-
When securing credit card data, the imperative to be PCI DSS compliant remains a constant, while the actual solution implemented by merchants can vary depending on the size and nature of an organization. A solution for a small merchant with low transactions will differ from mid-sized retailers with a web presence - from a large merchant with POS & back-office payment infrastructure.
Securosis.com's expert PCI-DSS analyst Adrian Lane, dissects the deployment models with ...
IDC Analyst Connection: Reducing Risk with Access Governance Solutions
[ Source: NetIQ ]
June 2012-
In this discussion with Sally Hudson, research director of IDC's Security Products and Services group, learn how to utilize access governance to reduce risk, provide better intelligence for overall business processes and the features to look for when evaluating a solution. Access governance is a process that promotes the operation, management, and high-performance levels of a business while ensuring the reduction of uncertainty. As such, access governance is increasingly important to business.
According ...
Clearing the Path to PCI DSS Version 2.0 Compliance
[ Source: NetIQ ]
June 2012-
As compliance demands comprehensive protection of cardholder data, enterprises require comprehensive solutions that support heterogeneous environments with a multitude of servers, operating systems, devices and applications. But getting to that point can be difficult without a good roadmap.
This whitepaper outlines a clear path to full PCI DSS compliance with a cost-effective solution.
Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security
[ Source: NetIQ ]
June 2012-
Despite growing protective security measures, data breaches continue to plague organizations. This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches. It also discusses file integrity monitoring as a critical component of Payment Card Industry Data Security Standard (PCI DSS) compliance, and shows how NetIQ addresses both security and compliance challenges through the NetIQ Identity ...
HII Report: Enterprise Password Worst Practices
[ Source: Imperva ]
June 2012-
Organizations can't afford to rely on employees, partners, or consumers to select "strong" passwords as the foundation for password security. Passwords should be viewed by IT professionals as highly valuable data that must be secured. This paper:
• Reviews obstacles that produce poor enterprise password management practices.
• Presents findings from an analysis of nearly 100,000 exposed passwords following a data breach at FilmRadar.com.
• Provides guidelines for proper password security policies ...
HII Report: An Anatomy of a SQL Injection Attack (SQLi)
[ Source: Imperva ]
June 2012-
Organizations of all sizes, and even Lady Gaga, are under SQL injection (SQLi) attack. According to Privacyrights.org, SQLi has contributed to 83% of successful hacking-related data breaches since 2005. Can your organization afford this type of attack?
This report analyzes SQLi attack variants that allow the evasion of simple signature-based defense mechanisms, investigates automated SQLi tool kits, such as Sqlmap and Havij, and recommends a three-fold approach to defeat SQLi.
Best Practices in System Security and Privacy
[ Source: IBM ]
April 2012-
IBM SmartCloud Notes helps to protect our customers' information through governance, tools, technology, techniques, and personnel. SmartCloud Notes is a full-featured email, calendar, contact management and instant
messaging service in the IBM cloud. At IBM, we strive to implement security and privacy best practices. The SmartCloud Notes security controls provide a range of protection of e-mail while enabling business operations.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

