Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
Endpoint Security and the iPad
[ Source: Solutionary ]
April 2012-
The iPad is essentially a laptop, with many of the same security concerns as any other computing device. This white paper examines endpoint security and the iPad from both its internal security protections, as well as some of the overall security concerns.
Protecting Against Advanced Malware and Targeted APT Attacks
[ Source: FireEye ]
February 2012-
Regain the upper hand on advanced targeted attacks. Learn how in a compelling new brief featuring Gartner research.
The cyber criminals are winning.
Today, more than 95 percent of businesses unknowingly host compromised endpoints. This is a direct result of advanced targeted attacks easily circumventing traditional IT security defenses - which can lead to theft of customer data, loss of valuable intellectual property, and irreparable damage to your brand. Discover what every ...
PCI DSS Compliance Demystified
[ Source: Dell ]
June 2011-
All companies that process, transmit or store credit card data must comply with PCI DSS v2.0. This white paper highlights the 12 requirements of PCI DSS and explains how one solution addresses all 12 requirements.
Discover how to implement effective controls to protect cardholder information and demonstrate provable compliance with one easy step.
Coming To An Online Bank Near You
[ Source: Checco Services Inc. ]
February 2006-
The FFIEC has created an initiative where enterprise e-business is measured not simply by corporate liability but by the protection of the enterprise customer. Although the guidance may be missing a legislative bite, it is prudent for the financial institutions to plan an implementation path for multifactor online authentication within this fiscal year.
The use of keystroke biometrics along with proper access control policies, logging, and auditing can create a cost-efficient and truly reasonable solution ...
Secure Desktop Solution: A Modern-Day Marriage of Business Benefit and Risk Reduction
[ Source: Novell ]
May 2008-
Traditional security is no longer good enough because complexity is increasing significantly. Traditional IT security was formerly provided by firewalls, antivirus solutions, and other security products. Such measures worked fine when security was defined around known threats and well-defined perimeter defenses. Now, a comprehensive security strategy must deal with the increased vulnerability of mobile assets and a threat environment that is smarter and more aggressive, organized, focused, and profit oriented. Download this white paper to ...
XSS (Cross-Site Scripting) Introduction
[ Source: V.A.P.T. ]
April 2008-
In this Whitepaper, we will cover the outline of how to prevent XSS attacks, how they work, and why they are so successful. Take a look at why this attack is so popular and how it affects some of the largest corporations in the world.
Application Whitelisting Preventing the Advanced Persistent Threat
[ Source: Bit9 ]
April 2010-
Zero-Day, Aurora, APT – a lot of different names describe today’s targeted attacks that boast unlimited tenacity and resources. The explosion in media coverage underscores a reality that security professionals have known for some time: the traditional reactive approach of blacklisting known viruses is simply no match for today’s modern malware and advanced threats.
How can you combat these evolving, well-funded threats that continue to outsmart existing defenses? According to Gartner, Application ...
Network Access Control, Part II
[ Source: InformationWeek ]
June 2007-
Compliance initiatives are driving deployments of network access control, but which system is best? Many vendors, both new and established, are offering NAC solutions. Finding a product that meets an organization's needs may be daunting given the number of options, but a fit is out there. This report analyzes enterprise use of NAC, based on the authors' expertise and market knowledge, as well as NWC polls of members of the IT community.
This ...
5 Critical Data Security Predictions for 2011
[ Source: Perimeter E-Security ]
December 2010-
Last year, enterprises of all sizes saw an exponential increase in the information risks they face. The term "data leak prevention" entered common usage among security professionals, while new buzzwords like "advanced persistent threat" gave them more things to worry about.
Listen to a recorded webcast presented by Andrew Jaquith, Chief Technology Officer for Perimeter E-Security and recent Forrester analyst, as he wraps up the year's top security stories, looks forward to the ...
Remote Call Center Security
[ Source: PhoneFactor ]
February 2009-
Call centers continue to move toward the cost-effective business model of at-home agents to maintain an onshore work force, but there is an increased risk of a security breach associated with at-home workers operating on their own equipment across unknown networks.
Depending on the industry served, call centers must meet any number of strict standards for maintaining password security. Many two-factor authentication systems are difficult and expensive to implement and administer, leading to ...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance
[ Source: Rapid7 ]
November 2012-
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance.
When you download this free eBook, ...
Bring Your Own Device Policy Consideration
[ Source: Good Technology ]
November 2012-
The increased use of personal iOS and Android devices in your workplace isn't a threat - it's an opportunity. When your employees use their own smart phones and tablets for work activities, they're likely to be happier and more productive. And your company can save money in the long run.
By putting the right usage policies and security technology in place, you can ensure your sensitive corporate data stays safe in transit and ...
Forrester Webinar: "Where Does your data go? Balancing Mobile Consumerization with Data Loss Prevention"
[ Source: Good Technology ]
November 2012-
When you enable mobile users to work from anywhere, and on their personal device, you increase productivity and profits for your organization. But, the benefits come with a new set of security risks from devices and applications that are no longer under your control.
This webcast, featuring Forrester Research, Inc. VP, Principal Analyst, Chenxi Wang, Ph.D., addresses how to balance the consumerization of IT with data loss prevention.
You'll discover ...
Cerberus: Malware Triage and Analysis
[ Source: AccessData Group ]
October 2012-
This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...
Finding An Effective Antivirus Solution To Please Users & Administrators
[ Source: ESET ]
October 2012-
Does your anti-virus bring your systems to a crawl? Is it causing administrators to pull their hair out? This whitepaper shows you how to solve both problems with one product!
Global Threat Report: September 2012
[ Source: ESET ]
October 2012-
Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
The 5 Key Benefits of Application Control and How to Achieve Them
[ Source: Sourcefire ]
September 2012-
Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks.
How do you encourage productivity and minimize risks?
Application control is key.
Read "The Five Key Benefits of Application Control and How to Achieve Them," ...
Empowering Endpoints: Unifying Data Protection and Collaboration
[ Source: Druva ]
September 2012-
This white paper presents the IT challenges caused by an increasing mobile and collaborative workforce and discusses how Druva can solve these challenges.
Guide to Evaluating Multi-Factor Authentication Solutions
[ Source: PhoneFactor ]
October 2012-
Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user's password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication is no longer optional for many organizations.
Whether you're planning to implement multi-factor authentication for the first time or are looking to expand ...
The Authentication Revolution: Phones Become The Leading Multi-Factor Authentication Device
[ Source: PhoneFactor ]
October 2012-
Escalating IT security threats and strengthening regulatory requirements are driving adoption of multi-factor authentication to unprecedented levels. Increasingly, new and expanded multi-factor implementations are leveraging phone-based authentication instead of hardware security tokens, which had previously dominated the multi-factor market. According to Goode Intelligence, an information security research and analysis firm, phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014.
This paper will address the key drivers for this market shift ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

