TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance

by SurfWatch LabsApr 16, 2015

This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.


Mobile Workflows that Enhance Productivity: 8 Use Cases

by Good TechnologyFeb 09, 2015

Financial Services companies everywhere are moving beyond the basics of mobility to deliver sophisticated mobile workflows that connect employees with each other, their partners and their customers. Read this paper to see eight secure mobile workflow use cases being used by organizations of various industries that enhance productivity.


Vulnerability Response Best Practices: Shellshock Case Study

by Alert LogicApr 08, 2015

The number of vulnerabilities identified in servers, operations systems, applications, and databases has increased at an alarming rate in the past several years-and the outlook going forward is no better. Systems, networks, and applications will continue to be susceptible to vulnerabilities, so it is important to be prepared for response when a vulnerability is identified.


Spiceworks Survey: Crypto Chaos - Data Traffic Security is a Mess

by CertesDec 29, 2014

Poor network security and inadequate traffic segmentation were chief causes of data breaches in 2013 and 2014, compromising billions of data records costing corporate hacking victims, banks, retailers and credit card issuers billions of dollars to clean up.

In November 2014, Certes Networks worked with Spiceworks and its community of more than 6 million IT professionals to discover how companies across the globe handle data in motion and other IT security issues. The results


How to Find an Unknown Threat

by RSA, Security Division of EMCDec 02, 2014

Watch how you can find and investigate previously unknown threats with RSA Security Analytics and RSA ECAT. Stop searching and start hunting, using deep network packet, endpoint and log detail to understand the true nature and scope of an attack that you did not know about in advance.


The CISO of Los Angeles World Airports on RSA Security Analytics and RSA ECAT

by RSA, Security Division of EMCDec 02, 2014

Bob Cheong, CISO of LA World Airports, discusses why RSA Security Analytics and RSA ECAT are key components of his state-of-the-art security operations center (SOC).


Beyond Whois: How Extended Domain Profiles Can Yield Unexpected Insights

by DomainToolsApr 22, 2015

Every investigation has a starting point. A basic Whois query takes just a few seconds but can quickly provide the foundation for a successful investigation However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report that goes beyond the vehicle title, there is a wealth of knowledge captured in other public data that can be invaluable to an investigator when leveraged appropriately. This is what we call our Domain Profile. Read this


Self-encrypting Drives: You Don't Have to Sacrifice Performance for Security

by SanDiskSep 30, 2014

As our ability to work remotely expands, so does the risk that untethered computing equipment and information might inadvertently be lost or fall into the wrong hands. However, countermeasure solutions to secure data and devices, such as encryption software, can either be cumbersome or result in actual performance slowdown. The good news is that companies can benefit from the best of both worlds with self-encrypting solid state technologies.


Watch ObserveIT webinar on monitoring privileged users

by ObserveITOct 23, 2014

In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!


How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure

by Radiant LogicOct 15, 2014

Learn how to deliver smarter, finer-grained authorization without uprooting your current identity infrastructure and reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.

Groups are essential to good policies and secure access. Organizations use them every day in a role-based access control model for authorization to web applications, cloud applications, and corporate portals. Yet groups are often static and assigning members is a


SUBTOPICS:

Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyses over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24x7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Cardiff and London.


Certes

Since 2000, Certes Networks has delivered groundbreaking, dependable solutions for encrypting sensitive traffic over data networks. With thousands of solutions deployed around the world, Certes delivers proven solutions for protecting data in financial services, health care, government, utilities, telecommunications, education and many other industries. Contact us today to learn how we can secure your mission-critical data traffic.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


Good Technology

Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100's leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government. Learn more at www.good.com.


ObserveIT

ObserveIT auditing software acts like a security camera on your servers. It provides bulletproof video evidence of user sessions, significantly shortening investigation time. Every action performed by remote vendors, developers, sysadmins, business users or privileged users is recorded. Video recordings include mouse click, app usage and keystrokes. Each time a security event is unclear, simply replay the video, just as if you were looking over the user's shoulder. ObserveIT is the perfect solution for 3rd Party Vendor Monitoring, Compliance Report Automation and Root Cause Analysis.


Radiant Logic

Radiant Logic, Inc. is the leading provider of virtual directory solutions for identity management and enterprise information integration. The RadiantOne Identity and Context Virtualization Platform is being utilized by Fortune 500 corporations to provide virtual access to any applications and data sources for authentication, authorization, profile and personalization data, for portals, and services provisioning for application integration projects. Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Companies and organization such as British Petroleum, Comcast, Discover Financial, Disney, Defense Information Systems Agency, Federal Reserve Bank, Federal Home Loan Bank, Fifth Third Bank, Freddie Mac, Lexmark, Telecom Italia, Symantec, USAF and Time Warner Telecom use the RadiantOne solution to speed deployment, solve integration challenges and cut costs for identity management projects.


RSA, Security Division of EMC

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA's award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.


SanDisk

SanDisk delivers flash storage solutions used in data centers, embedded in smartphones, tablets, and laptops, and trusted by consumers worldwide.


SurfWatch Labs

SurfWatch Labs delivers cyber risk intelligence solutions that help organizations understand the potential for cyber-attacks, determine the impact to their business and proactively address threats head on. SurfWatch Labs was formed in 2013 by former US Government intelligence analysts to go beyond the low-level threat intelligence approach that can drown organizations in data. By aggregating and automatically analyzing vast amounts of data from a wide range of structured and unstructured sources, SurfWatch enables organizations to zero in on their unique cyber risk profile and ensure the most effective risk management strategies are identified and implemented. With SurfWatch, organizations can immediately understand and act on their cyber risk. SurfWatch Labs: Cyber In Sight. For more information, visit www.surfwatchlabs.com.