Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......
BPM for Dummies
[ Source: IBM ]
August 2012-
Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012-
Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Sponsored by:<...
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011-
The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011-
In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011-
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012-
Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011-
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011-
Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011-
Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
IBM Endpoint Manager: Reaping the Benefits of a Unified Approach to Security and IT Operations Management
[ Source: IBM ]
June 2012-
In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...
Establishing a Data-Centric Approach to Encryption
[ Source: Voltage Security ]
April 2012-
Many data breaches occur at companies that already have a data security policy in place. What is the problem? Typically, intrusion detection and other technologies designed to keep intruders out of your system are built to protect against previously known hacking strategies. This approach exposes your IT systems to great risk as new methods of intrusion are constantly being devised. Learn how to protect corporate data with a data-centric encryption strategy.
Backup and Recovery Challenges with Sharepoint
[ Source: Autonomy ]
May 2010-
Almost 70% of organizations these days are either planning or already have SharePoint deployed as a platform for collaboration within their IT infrastructure. But with this success we are seeing SharePoint go through the same growing pains many other Microsoft products went through in their initial success stages. With the high-speed adoption of Exchange in the mid-1990s, we saw the volume of information grow to where the backup systems started to buckle under the ever-increasing ...
Security vs. Disaster Recovery: Three Best Practices Of Disaster-Proof Hard Drive Technology
[ Source: ioSafe ]
January 2007-
Almost all data resides on hard drives. The lowly hard drive does almost everything well. It's good, fast, and cheap for nearly all scenarios wherever data is stored. Standard hard drives are not disaster proof. ioSafe waterproof and fireproof hard drives offer a solution to that problem.
The Data is the New Perimeter
[ Source: Voltage Security ]
April 2012-
Most companies place a high premium on IT security, and believe they have ironclad protection. However, the toll from cyber-attacks continues to climb. That's because there are gaping vulnerabilities in the way defenses are deployed - firewalls, endpoint security and even protected storage can all be bypassed by attackers. Learn how a data-centric security approach can make data useless to data thieves.
Taneja Group: GridBank: Comprehensive Archiving Solution
[ Source: Tarmin Technologies ]
September 2008-
A comprehensive archive solution can appeal to enterprises of all sizes, and large organizations with lots of data will be able to make compelling economic cases for deployment. But smaller companies should take note as well: GridBank offers a comprehensive archiving solution without requiring any custom integration, a value proposition that is attractive to companies that cannot afford to create their own solutions by integrating multiple vendors’ archive products.
Desktop Virtualization: Improve Data Protection, Security and Efficiency
[ Source: Dell/Windows 7 ]
September 2011-
Managing desktop PC's is increasingly more difficult because of new security risks, remote workers and data retention and protection regulations. Simply put, the cost and time associated with managing desktops is rising at a time when budgets are being tightened and IT staffing is strained. Desktop virtualization is the answer.
Learn how to improve system availability, provide robust data protection, enhanced security, and improved worker productivity with Dell?s complete desktop virtualization solution.
Used Magnetic Media Data Erasure & Data Security
[ Source: Imation ]
October 2008-
With increasing budgetary pressures, data center managers may be tempted to recoup some of their tape investment by reselling magnetic tape cartridges which are no longer needed. The methods tape resellers use in attempts to remove the original owner's data vary widely, and are largely unsuccessful. New data erasing devices are being touted as having the ability to eliminate original customer data while leaving the servo guiding signals of higher capacity cartridges intact. Imation's laboratory ...
Six Myths About Cloud Computing
[ Source: Advanced Systems Group ]
November 2009-
When it comes to technology these days, the cloud is the place to be. Cloud computing has emerged as a hot trend, right alongside virtualization and service-oriented architecture (SOA). Vendors are racing to cash in.
As a result, market misinformation abounds, creating confusion among organizations that might otherwise benefit from the new technology. And as with any emerging technology, much remains in flux. Standards are still evolving, prices and pricing models vary widely, ...
Small Business IT Security: Outsource or In-house?
[ Source: Dell ]
June 2011-
Does it cost a business more to manage IT security internally than it does to entrust an experienced third party to do it?
Download this whitepaper to discover the 5 cost considerations, 6 best practices to security selection and whether your small organization is best suited for in-house security or for external managed security.
A New Breed of Information Security Leader: The Hyper-Connected Era and What It Means for CIOs and CISOs
[ Source: IBM ]
December 2012-
2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?
Consolidated Security Management for Mainframe Clouds
[ Source: IBM ]
December 2012-
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
How Does IBM Deliver Cloud Security
[ Source: IBM ]
December 2012-
Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualised environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and deprovisioning environment while experiencing the loss of ...
Intelligent Role Management for Improved Security and Compliance
[ Source: IBM ]
December 2012-
In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are overly complex and are not suited for business users. To find out how the integrated Role and Policy Modeler component of IBM Security Identity Manager ...
Close Encounters of the Third Kind
[ Source: IBM ]
December 2012-
This white paper presents the results of a research study on the prevalence of client-side JavaScript vulnerabilities, conducted by the IBM Security (formerly, IBM Rational) application security team. For this study, the researchers used IBM JavaScript Security Analyzer (JSA) technology, which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. This kind of analysis is superior to and more accurate than regular static ...
Cloud-based email archiving: A practical guide
[ Source: mimecast ]
November 2012-
In this whitepaper, we detail the issues involved in email archiving, consider best practices,and present a solution that emphasizes scalable cloud-based storage, secure access to assets, and high availability.
Complete Storage and Data Protection Architecture for VMware vSphere and Microsoft Hyper-V
[ Source: HP ]
November 2012-
In this white paper, HP and Veeam Software outline an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft Hyper-V environments. Core components of the architecture are HP LeftHand Storage, HP StoreOnce Backup, and Veeam Backup & Replication software.
IDC Tech Spotlight: Benefits of Unified Endpoint Data Management in Embracing BYOD
[ Source: Druva ]
November 2012-
End users now access critical corporate data on personal devices and use consumer-grade web applications for work-related tasks, making it difficult for IT to fulfill one of their most important responsibilities: keep enterprise data secure.
Download the full IDC report to learn the impacts of this trend, as well as the benefits of unifying the often discreet IT functions of data protection, security, storage, and collaboration.
Cerberus: Malware Triage and Analysis
[ Source: AccessData Group ]
October 2012-
This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...
Forrester Research - Disaster Recovery Exercises Fall Short of the Finish Line
[ Source: VMware ]
October 2012-
Though many enterprises have advanced disaster recovery technologies put in place, they still fall short when it comes to actual preparedness due to a lack of formal processes and a strict regimen for exercising DR plans.
This report details 10 tips for updating and improving your current DR exercise program to help you meet expected recovery objectives when faced with an unexpected event.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

