UBM: TECH DIGITAL RESOURCE LIBRARY

Lumension

Our Website: http://lumension.com


Latest Content From Lumension

Whitepaper: Committed To Memory: Protecting Against Memory-Based Attacks

by LumensionMar 01, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here's what you need to know about memory-based attacks-and how to effectively protect against them.


Whitepaper: Lumension Guide To Patch Management Best Practices

by LumensionMar 01, 2014

With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities. Here are the Lumension-recommended steps to cure your patch management headache.


Whitepaper: Closing The Antivirus Protection Gap: A Comparative Study On Effective Endpoint Protection Strategies

by LumensionMar 01, 2014

Corporate economic concerns have put increased pressure on already limited IT resources in recent years as the onslaught of malware and sophistication of cyber attacks continues to grow at exponential rates. As a result, 50% of endpoint operating costs are directly attributable to malware, yet corporate IT budgets are still focused on maintaining stand alone antivirus as the keystone in endpoint security. In this paper, we will benchmark the effectiveness of standalone AV and O/S resident patching solution versus newer technologies and a defense-in-depth of approach of layering multiple endpoint security and operational technologies together.


Whitepaper: The 2014 Endpoint Security Buyer's Guide

by LumensionMar 01, 2014

Last year we offered our thoughts on buying Endpoint Security Management offerings - including patching, configuration, device control, and file integrity monitoring - which are increasingly bundled in suites to simplify management. In this updated and revised 2014 Endpoint Security Buyer's Guide we update our research on the management functions described last year and add coverage of antimalware, mobility, and BYOD. All very timely and relevant topics. The goal of this guide remains to provide clear buying criteria for those of you looking at these solutions in the near future.


Whitepaper: Lumension Guide To Device Control Best Practices

by LumensionMar 01, 2014

USB flash drives and other removable storage devices continue to proliferate throughout organizations. This could result in the loss or theft of your sensitive corporate and customer data, or in the propagation of malware like Stuxnet. Fortunately, powerful data protection tools are now available to help mitigate these risks, while still enabling flexible and managed use of these productivity devices. Learn about the best practices for deploying device control within your environment. Walk away with the recommended process to successfully prepare, enforce and manage the use of removable devices and media, and to protect your sensitive data.


Webcast: The Evolution of Advanced Persistent Threats: The Current Risks & Mitigation Strategies

by LumensionNov 14, 2013

APTs have become a major topic of conversation – and in some cases, a critical threat – among IT security departments. But the technology and motivation behind APTs has changed significantly since the introduction of Stuxnet, continuing to evolve rapidly to avoid detection.

In this special Dark Reading webcast, a leading expert on the origins and directions of APTs will discuss the changing nature of these sophisticated threats – and how you can prepare your enterprise security environment to detect and mitigate these complex and dangerous attacks.


Webcast: The Evolution of Advanced Persistent Threats: The Current Risks & Mitigation Strategies

by LumensionNov 14, 2013

APTs have become a major topic of conversation – and in some cases, a critical threat – among IT security departments. But the technology and motivation behind APTs has changed significantly since the introduction of Stuxnet, continuing to evolve rapidly to avoid detection.

In this special Dark Reading webcast, a leading expert on the origins and directions of APTs will discuss the changing nature of these sophisticated threats – and how you can prepare your enterprise security environment to detect and mitigate these complex and dangerous attacks.