UBM: TECH DIGITAL RESOURCE LIBRARY

Internet Security Systems


Latest Content From Internet Security Systems

Whitepaper: VoIP: The Evolving Solution and the Evolving Threat

by Internet Security SystemsJan 01, 2008

Voice over Internet Protocol and Internet Protocol Telephony (IPT) are two evolving solutions that are switching phone transmissions from analog to digital. Compiling and transporting a voice conversation digitally offers organizations many new benefits, saving them money and introducing new and more advanced features. Enterprises wishing to exploit the advantages of switching voice calls to the IP network must understand that maintaining security of those packets is an integral part of the


Whitepaper: The Evolution of Managed Security Services: ISS Virtual-SOC Solution, Security the Way You Need It

by Internet Security SystemsJan 01, 2008

Even with increased security budgets, IT organizations still face the challenges of staffing skilled security experts, keeping up with rapid security technology advancements and developing successful security procedures. Internet Security Systems (ISS) has developed the Virtual Security Operations Center (Virtual-SOC) integrated services architecture to help IT organizations such as to address these challenges. ISS Virtual-SOC is a framework for integrating security tools, services and


Whitepaper: FISMA Compliance: A Holistic Approach to FISMA and Information Security

by Internet Security SystemsJan 01, 2008

Threats and attacks against information systems are on the rise. Internet Security Systems (ISS) and other security companies are now identifying more than 150 new viruses, Trojans, bots and vulnerabilities each week. Attacks launched by dangerous adversaries are targeting information systems globally, including federal systems, to inflict irreparable damage and ultimately threaten the nation’s security. This white paper provides an overview of the Federal Information Security Management


Whitepaper: X-Force Threat Insight Quarterly: Phishing and Other Significant Threats of 2004

by Internet Security SystemsJan 01, 2008

""Phishing,"" a specific method of social engineering that continues to grow in popularity. Phishing can be defined as a malicious attempt to lure an unsuspected user to either provide sensitive information (passwords, credit card information, etc.) or compromise the user’s system. Most security professionals would agree that the weakest link in any corporate security strategy is the end user.


Whitepaper: Defining the Rules of Preemptive Protection: The ISS Intrusion Prevention System

by Internet Security SystemsJan 01, 2008

Organizations evaluating IPS should look beyond point products or even so-called best-of-breed vendors that offer only a handful of protection, performance or research components. Without all three, the IPS can not stop threats before they impact business. High-performing IPS products keep pace with network traffic and avoid disrupting legitimate operations. Finally, a combination of research, including a focus on vulnerabilities as well as threats, must be infused into the IPS to enable true


Whitepaper: Security Best Practices for Sarbanes-Oxley Act Compliance: Overview

by Internet Security SystemsJan 01, 2008

In order to streamline security and help achieve security best practices for Sarbanes-Oxley Act, ISS has developed a five-step process covering the complete security management lifecycle, including phases for Assessment, Design, Deployment, Management and Education (ADDME). The ADDME process identifies and analyzes gaps in the current security state compared to requirements for security best practices. It then designs and implements solutions to close those gaps and ensure ongoing conformity.


Whitepaper: Approaching Risk Management As A Business Process

by Internet Security SystemsJan 01, 2008

The continued rise of new technologies and systems being introduced to the workplace on a daily basis results in a broad spectrum of risk for businesses. Businesses must also consider the risks posed to their operations from legacy systems, established business processes, partner supply chains and existing applications. To date, the information security industry has contributed to this problem with new point security solutions to address specific risks to distinct network assets. Unfortunately,


Whitepaper: Controlling the Use of Instant Messaging and Peer-to-Peer Applications With the Proventia Intrusion Prevention Appliances

by Internet Security SystemsJan 01, 2008

This paper identifies the techniques that can help businesses block, control and tailor the use of instant messaging applications and peer-to-peer applications with Internet Security Systems. The appropriate instant messaging and peer-to-peer events are described in the following sections, which include a short description of what each event consists of. Detailed step-by-step instructions that describe how to enable in-line blocking for peer-to-peer and instant messaging events using the


Whitepaper: Comparison: ICEcap Manager to SiteProtector

by Internet Security SystemsJan 01, 2008

This paper provides customers who are using ICEcap Manager 3.6 with a thorough description of feature and functionality comparisons with the SiteProtector application. There is significant difference in the architecture, scope and abilities between the ICEcap Manager (ICM) and SiteProtector (SP). This comparison includes the ICEcap Manager and the new counterpart within SiteProtector called the Desktop Controller (DC). There are many features and advantages to SiteProtector that are not