BPM for Dummies
[ Source: IBM ]
August 2012- Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012- Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011- In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011- This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011- Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011- Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011- Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
Principles & Policies of Perpetual Paranoia: The New Rules for Enterprise IT Security
[ Source: Certes ]
March 2015- Enterprise users are putting many more demands on IT security than ever before. At the same time, the IT security architecture is being tested by hackers at unprecedented levels.
In the middle of this "perfect storm" of demands and challenges, how is IT security to cope? How do the stakeholders in network, applications and information security departments gain clarity and alignment to ensure gaps are plugged and compliance needs are met? An emerging ...
IBM Endpoint Manager: Reaping the Benefits of a Unified Approach to Security and IT Operations Management
[ Source: IBM ]
June 2012- In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...
The Data is the New Perimeter
[ Source: Voltage Security ]
April 2012- Most companies place a high premium on IT security, and believe they have ironclad protection. However, the toll from cyber-attacks continues to climb. That's because there are gaping vulnerabilities in the way defenses are deployed - firewalls, endpoint security and even protected storage can all be bypassed by attackers. Learn how a data-centric security approach can make data useless to data thieves.
Securing the Web in your Company: Proven Strategies Revealed
[ Source: Trend Micro ]
February 2010- The Internet and growing use of Web 2.0 applications have left organizations more vulnerable to attack than ever before. From smartphones to Twitter and Skype, the Internet has opened the floodgates to increasingly sophisticated exploits by hackers and cybercriminals. Coupled with the deployment of less-robust web-focused defenses, the result is web exploits that will increase for the foreseeable future.
This thorough, highly readable paper explains the latest threats from the web and the most ...
Designing a Secure DNS Architecture
[ Source: Infoblox ]
May 2014- In today's networking landscape, it is no longer adequate to have a DNS infrastructure that simply responds to queries. What is needed is an integrated self-protecting DNS architecture that also enables smart growth. DNS is essential to any organization. Without a working DNS protocol, it would be almost impossible to have an Internet of Things that communicate with each other. Without a proper DNS infrastructure, your organization would not have a presence in cyberspace. Ecommerce ...
Anatomy of Insider Risk
[ Source: Lumension ]
January 2011- Organizations today are typically aware of the problems they face from inside the firewall, but so many leaders focus on the risk of thieves and disgruntled employees, that they leave too much room for error from the much more common insider threat: well-meaning, but negligent, insiders.
Ill-trained and poorly monitored, these hapless employees and partners have the potential to cause as much damage as the bad apples of the bunch.
Protecting Against the New Wave of Malware
[ Source: Sunbelt Software ]
September 2008- Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations regardless of their size. Viruses, worms, spyware and other forms of malware are becoming more virulent, their authors are becoming more adept at getting around existing defenses, and the profits generated by malware are funding new and more dangerous threats.
At the same time, many anti-virus, anti-spyware and other anti-malware defenses are not keeping up with the growing threats posed ...
Key trends driving global business resilience and risk - Findings from the 2011 IBM Global Business Resilience and Risk Study
[ Source: IBM ]
November 2011- Integration, cloud, security and company-wide participation are among key elements of successful business resilience and risk management strategies that deliver business value and competitive advantage - as detailed in the new 2011 IBM Global Business Resilience and Risk Study research report.
Database Security in Virtualization and Cloud Computing Environments
[ Source: Sentrigo ]
April 2010- Cloud Computing and Virtual Datacenters present unique challenges when it comes to securing sensitive data. The benefits of these new architectures are clear, including: the ability to share resources through server consolidation, quickly scale up (and down) capacity based on changing needs, and to flexibly update servers without impacting production.
Less hardware can lower costs, and even mean a greener datacenter. However, the combination of dynamic system resources, complex network topology, and lack ...
An Executive Guide to Corporate Defence Management (CDM)
[ Source: R.I.S.C. International ]
January 2008- This whitepaper on the emerging discipline of Corporate Defence Management (CDM) is the first of its kind dealing with this subject. The whitepaper represents the 3rd installment in a series of papers designed to raise awareness of the requirement for corporate defence to play a more eminent role in corporate strategy. This paper is designed to act as a helpful guide to executives interested in the area of contemporary corporate defence and in particular in ...
10 Ways Everyone Should Approach Cybersecurity in 2015
[ Source: Global Knowledge ]
February 2015- Many security breaches over the last year have taught us new lessons (or clarified ones we should have already learned). This paper reviews these key issues and focuses attention on ten responses we all need to adopt in our approach to security in 2015.
The Human Factor 2015
[ Source: Proofpoint ]
April 2015- Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments, tracking threats in email attachments, social media posts, and URLs.
This paper uses original field research to provide insight on who is clicking, and what they are clicking on, ...
Beyond Whois: How Extended Domain Profiles Can Yield Unexpected Insights
[ Source: DomainTools ]
November 2014- Every investigation has a starting point. A basic Whois query takes just a few seconds but can quickly provide the foundation for a successful investigation However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report that goes beyond the vehicle title, there is a wealth of knowledge captured in other public data that can be invaluable to an investigator when leveraged appropriately. This ...
Supercharge Your SIEM: How Domain Intel Enhances Situational Awareness
[ Source: DomainTools ]
April 2015- Security Information and Event Management (SIEM) tools have become indispensable for the modern enterprise. These are the eyes and ears of a security team, providing them with the ability to detect network anomalies and track down threats. But even the best SIEM tool falls short when it comes to situational awareness of key "outside the firewall" aspects of an attack. Security professionals have long understood that they must evolve quickly to meet the challenges of ...
Best Practices for Dealing with Phishing and Next-Generation Malware
[ Source: ThreatTrack Security ]
April 2015- Despite the billions of dollars spent each year on anti-phishing, anti-malware, antianti- spam and other security solutions, threats still find their way into most organizations despite the best efforts of security teams to stop them. In fact, for many organizations the problem is actually getting worse over time. The consequences of these incursions can be severe, and in some extreme cases cause a business to go bankrupt.
Cybercriminals Wreak Havoc Beyond Big Enterprises
[ Source: ThreatTrack Security ]
April 2015- Breaches at large enterprises grab headlines, but cybercriminals are developing a taste for smaller businesses. The mid-market (companies with 500 to 2,500 employees) is becoming fertile ground for cybercriminals looking to exploit unsuspecting organizations with valuable data to steal and much more to lose.
Key Tools for Maximizing Your Hybrid Cloud Investment
[ Source: XO Communications ]
April 2015- Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.
Dealing with Data Breaches and Data Loss Prevention
[ Source: Proofpoint ]
April 2015- As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the strategies and tools at their disposal for breach mitigation.
Download the latest research report from Osterman Research, Inc., Dealing with Data Breaches and ...
The New Phishing Threat: Phishing Attacks
[ Source: Proofpoint ]
April 2015- The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails.
Historically, phishing attacks targeted end-users with attackers going after credentials to financial accounts. But modern phishing attacks have evolved toward targeting sensitive corporate data as evidenced by the high profile data breaches targeted at diverse organizations including RSA ...
Unified Security Management vs. SIEM: A Technical Comparison
[ Source: AlienVault ]
September 2014- SIEM solutions have been widely adopted to help IT teams correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money and expertise to properly normalize data feeds, create correlation rules to detect threats and tune those rules to limit false positives. Download this white paper to learn more about how a different approach - Unified Security Management (USM) - is delivering improved threat detection, starting ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services