Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
Best Practice Log Management: Correlation is Key
[ Source: CorreLog ]
October 2011-
Today, collecting email data is a necessity for compliance standards, forensic analysis and managing end-user performance and availability. But making sense of the data is a challenge within itself. Collecting the data is only part of the equation and research and many shops are turning towards correlation which helps bring meaning to the massive amount of data collected. This white paper explains how to establish a systematic approach to identifying relationships (correlating!) between log data ...
A Guide to Email Regulatory Compliance
[ Source: Perimeter ]
August 2009-
Laws have been passed to more adequately secure private and sensitive information, many of them specifically requiring better email security. Secure your information exchange by acting on the essential tips provided in this whitepaper.
Unraveling Web Malware
[ Source: FireEye ]
September 2009-
There has been a rapid rise in the use of web blended threats to exploit client browsers and operating systems. These can lead to infection by bots which can be controlled remotely. Eleven percent of the world’s computers are enmeshed in at least one botnet and 72% of corporate networks with more than 100 computers have an infection.
Obfuscated code and encrypted exploits are increasing in prevalence. The point of these exploits is to ...
Research Paper: VIPRE Takes a Bite Out of Bloatware
[ Source: Sunbelt Software ]
January 2009-
Protect your servers, workstations and networks with security software that won’t slow you down.
Preventive antivirus and antispyware packages are “must haves” in today’s networking environments. No company from the smallest business with 10 users up to the largest enterprise with 100,000+ employees is immune from the security threats posed by rogue code – which include viruses, Trojans, bots, zombies, spyware, spam and blended malware. The threats have become more sophisticated, pervasive and pernicious ...
IronPort 2008 Internet Malware Trends Report
[ Source: IronPort Systems ]
November 2008-
In 2007, Storm burst onto the scene and rapidly spread. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily sophisticated. Storm and newer malware botnets that build on Storm’s strengths continue to affect and threaten Internet communication. To help explain the spread of Storm and current and future threats posed by similar malware, this report offers an examination of Storm and its history.
Does Size Matter? The security challenge of the SMB
[ Source: McAfee ]
September 2008-
Just because a business is small, doesn’t mean it’s immune to security threats. Security challenges facing Small and Medium Businesses in North America are on the rise. For businesses of all sizes, viruses, hacker intrusions, spyware and spam can lead to lost or stolen data, computer downtime, decreased productivity, compliance issues, lost sales and even loss of reputation. According to a recent survey conducted by McAfee, many small and medium sized businesses felt ...
Secure Desktop Solution: A Modern-Day Marriage of Business Benefit and Risk Reduction
[ Source: Novell ]
May 2008-
Traditional security is no longer good enough because complexity is increasing significantly. Traditional IT security was formerly provided by firewalls, antivirus solutions, and other security products. Such measures worked fine when security was defined around known threats and well-defined perimeter defenses. Now, a comprehensive security strategy must deal with the increased vulnerability of mobile assets and a threat environment that is smarter and more aggressive, organized, focused, and profit oriented. Download this white paper to ...
Application Whitelisting Preventing the Advanced Persistent Threat
[ Source: Bit9 ]
April 2010-
Zero-Day, Aurora, APT – a lot of different names describe today’s targeted attacks that boast unlimited tenacity and resources. The explosion in media coverage underscores a reality that security professionals have known for some time: the traditional reactive approach of blacklisting known viruses is simply no match for today’s modern malware and advanced threats.
How can you combat these evolving, well-funded threats that continue to outsmart existing defenses? According to Gartner, Application ...
The Web Hacking Incidents Database 2008: Annual Report
[ Source: Breach Security ]
March 2009-
The much anticipated Breach Security Lab’s Web Hacking Incidents Database (WHID) 2008 Annual Report is ready for download. The WHID project is dedicated to maintaining a record of web application-related security incidents. The WHID’s purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. This year the report findings prove that no company or market sector is immune ...
It's Time to Fix The Firewall
[ Source: Palo Alto Networks ]
June 2009-
For the last 15 years, port-blocking firewalls have been the cornerstone of enterprise network security. But much like a stone, they’ve stood still in the face of rapidly evolving applications and threats. It’s no secret that modern applications and threats easily circumvent the traditional network firewall – so much so that enterprises have deployed an entire crop of “firewall helpers” to help try to manage applications and threats, which has only increased cost and complexity ...
The State of DDoS Protection: Organizations Remain Unprepared for DDoS Attacks
[ Source: Neustar ]
December 2012-
Distributed denial-of-service (DDoS) attacks continue to grow in size, complexity and danger. Witness the recent wave of attacks on major U.S. banks, which knocked websites offline, angered customers and took a grave toll on brand reputations. The lessons of those attacks echo the findings of this report: Previously successful DDoS mitigation solutions no longer work.
UBM Tech conducted research with IT professionals who have suffered DDoS attacks. The drastic changes in attack ...
Understand Your Mobile Vulnerability Risks
[ Source: Rapid7 ]
November 2012-
Do you know how to protect your company data against mobile vulnerabilities?
Watch Rapid7's where Dirk Sigurdson, Director of Engineering for Mobilisafe at Rapid7 discusses the importance of understanding mobile vulnerabilities and risks and best practices for mitigation.
This webcast covers:
Mobile vulnerability overview and landscape
Differences of vulnerabilities including examples categorized as severe
How to tackle remediation for mobile vulnerabilities
This webcast will also include a ...
Tolly Report: Anti-Virus Performance in VMWare ESX Virtual Environments
[ Source: Symantec ]
October 2012-
Symantec Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware ESXi 5 virtual environments vs. Trend Micro Deep Security 8. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning, and during distributed virus definition update
Dennis Technology Labs - Effectiveness in Virtual Environments
[ Source: Symantec ]
October 2012-
This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.
Cybersecurity in Action
[ Source: Guidance Software ]
October 2012-
4 Days, 465 Systems, 3 continents
The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.
Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...
Achieving Compliance in Digital Investigations
[ Source: Guidance Software ]
October 2012-
80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.
This ...
How Three Cyber Threats Transform the Role of Incident Response
[ Source: Guidance Software ]
October 2012-
“The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System
While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage ...
Securing the Cloud
[ Source: F5 ]
October 2012-
Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add to this array of concerns the potential loss of control over your data, and the cloud model starts to get a little scary. ...
The 5 Key Benefits of Application Control and How to Achieve Them
[ Source: Sourcefire ]
September 2012-
Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks.
How do you encourage productivity and minimize risks?
Application control is key.
Read "The Five Key Benefits of Application Control and How to Achieve Them," ...
SCADA Product Sheet
[ Source: Norman ]
July 2012-
SCADA (Supervisory Control and Data Acquisition) describes computerized industrial control systems that monitor and control industrial and infrastructure processes. With recent attacks, manufacturers, utilities and industries must now implement solutions to protect their SCADA systems. See the product sheet to learn how the Norman SCADA Protection system protects against cyber-attacks that target critical SCADA systems.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

