Sort results by: Published date | Company name
Showing items 1-25

Prepare For the Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus [ Source: Bit9 ]

July 2014- As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and servers, and security and risk (S&R) professionals have begun to realize this, as evidenced by survey results showing decreased adoption and interest in AV among small and medium-size businesses and enterprises alike.

A growing number of S&R pros are considering replacing their third-party ...

eBook: Endpoint Threat Detection, Response and Prevention for Dummies [ Source: Bit9 ]

July 2014- Traditional signature-based endpoint protection solutions struggle to protect against today's advanced threats and zero-day attacks. Enterprises need to detect and respond based on real-time monitoring and a continuous recorded history to reduce the attack surface with leading default-deny prevention solutions. Download the eBook to understand:

• How every enterprise is a target
• Why traditional endpoint security solutions can't protect your environment from advanced threats
• How endpoint threat detection, response, ...

Reducing Expenses Starts With the Programming Skills of Operations Groups [ Source: F5 ]

July 2014- Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today's new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the technology industry looks obsessed with the idea of automation, continuous delivery and programmability. With good reason, because the evidence is all around us-saving time is ...

The F5 ADC is a Platform, Not a Product [ Source: F5 ]

July 2014- Platforms are a key success factor whether we're talking about phones or cloud or Application Delivery Controllers (ADCs). F5's offering-TMOS-has been a platform supporting an extensible ecosystem of application-focused "apps." Over the past 10 years, the ADC market has continued to experience growth with the upper limit on the ADC market constrained only by current definitions. Thus, the ADC must be a platform and not a product to continue to adapt to the needs of ...

DNS Challenges in a Changing Landscape [ Source: F5 ]

July 2014- IDG Research Services surveyed DNS administrators from large organizations to understand the challenges of deploying an available, secure, high-performance DNS infrastructure. Download the infographic to understand the key issues you need to think about to ensure your DNS servers don't fail.

Web App Acceleration: Practical Implementations [ Source: F5 ]

July 2014- Web application acceleration implementations use combinations of three key acceleration principles: 1. Send data as efficiently as possible; 2. Send data as infrequently as possible; and 3. Send as little data as possible. Different combinations can produce very different results and, more importantly, they can require dramatically different investments in time and resources. To decide on the best practical implementation of acceleration technologies for a particular organization, it is important to explore how each implementation employs the key ...

Three Key Principles to Accelerating Web Applications [ Source: F5 ]

July 2014- Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about ...

Five Best Practices to Maximize ROI [ Source: IBM ]

July 2014- Big data is enabling businesses to discover actionable market opportunities and to pinpoint problems such as waste and fraud. These five proven practices for maximizing big data ROI, based on the experiences of early adopters, will set your big data initiatives on the path to success.

How Next-Gen DBMS Technology is Essential to Big Data [ Source: IBM ]

July 2014- Few organizations have the money to rip out their existing infrastructure to replace it with one that can handle the new load. This solution guide explores how to tackle these challenges, while keeping up with the need for increasingly complex analytics.

Why DBMSs Matter More than Ever [ Source: IBM ]

July 2014- Big data promises valuable insights that are enticing organizations to invest in analytics and BI tools. Yet many overlook the need for a DBMS that can stand up to the strain big data places on the underlying infrastructure.

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

July 2014- Cybersecurity for the enterprise. There is no silver bullet. But as business becomes more connected and as data moves further outside the organizational walls, enterprises need look at weaknesses in the security chain - and a good place to start is in the supply chain.

Small businesses sit on the "front lines" in the round-the-clock cybercrime battle. Think about how many small businesses, suppliers and customers have access to different areas of an ...

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

July 2014- The market for cyber liability insurance has been around for over a decade, but only recently has it experienced a spike in demand. The variety of recent high-profile data breaches have cast light on the importance of having coverage should a cyber-attack strike a business. No business is immune to a cyber-attack, which can wreak havoc not only on the IT environment, but also on the bottom line.

Despite all of this, cyber ...

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

July 2014- When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed.

But when it comes to cybersecurity, the complex and often technical world of cybersecurity needs to be transformed into practical information that can be easily understood by the business as well as security pros. Many variables come into ...

Three Guiding Principles for Data Security and Compliance [ Source: IBM ]

July 2014- The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target - as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.

Because data is a critical component of daily business operations, it is essential to ensure privacy ...

Top 3 Myths about Big Data Security: Debunking Common Misconceptions about Big Data Security [ Source: IBM ]

July 2014- Data volumes are growing rapidly with no end in sight. Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.

Top Tips for Securing Big Data Environments: Why Big Data doesn't have to mean Big Security Challenges [ Source: IBM ]

July 2014- Big data environments create significant opportunities. However, organizations must come to terms with the security challenges they introduce, for example big data environments allow organizations to aggregate more and more data - much of which is financial, personal, intellectual property or other types of sensitive data - most of the data is subject to compliance regulations.

As big data environments ingest more data, organizations will face significant risks and threats to the repositories ...

Integrating and Governing Big Data [ Source: IBM ]

July 2014- While the term "big data" has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades, leading the way with data integration, management, security and analytics solutions known for their reliability, flexibility and scalability. The end-to-end information integration capabilities of IBM InfoSphere Information Server are designed to help organizations understand, cleanse, monitor, transform and deliver data - as well as collaborate to bridge the gap between ...

Intelligent Compliance - Establishing Trust in the Datacenter [ Source: BMC Software ]

July 2014- With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. It only takes one breach and the cost to your organization can spiral out of control.

In this whitepaper, you will discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Through the Intelligent Compliance process, you ...

Top 10 Things Every Web Application Firewall Should Provide [ Source: Imperva ]

July 2014- Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Why?

• Hackers evade traditional network security defenses to take down websites and to steal data.

• Malicious users probe websites around-the-clock looking for vulnerabilities.

• Automation tools such as off-the-shelf attack toolkits and botnets make it easy to execute large-scale attacks.
Web application firewalls have become the central platform for protecting applications against ...

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

July 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...

Network Transformation: A Guide to Planning Your Journey to All-IP [ Source: Neustar ]

July 2014- Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

July 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

Forensic Domain Mapping: How to Reverse Engineer Domain Ownership in a Cyber Investigation [ Source: DomainTools ]

July 2014- For investigators tasked with identifying the perpetrator of online fraud, it's often the little things that can make the difference. Cyber investigators must work diligently to ferret out the smallest details in order to snare their quarry. Investigating a digital crime is not so dissimilar as investigating a crime in the 'real world'. While popular TV shows might have you believe that a single fiber found at the scene of a crime will lead directly ...

Domain Attribution: Piercing the Veil of Masked Domain Owners [ Source: DomainTools ]

July 2014- As the Internet has evolved to become a primary channel of trade and commerce, so has the sophistication of criminal organizations and other perpetrators of fraudulent schemes who take advantage of domain privacy features as a means by which to mask their true identity. Domain privacy, a controversial topic since its introduction in 2003, provides domain owners with the option to substitute the registrar's contract information for their own. While there are a variety of legitimate ...

Best Practices Guide: Using DNS Data for Threat Intelligence and Incident Forensics [ Source: DomainTools ]

July 2014- Cybercrime represents a major threat to both government and businesses, costing the economy hundreds of billions of dollars in losses every year. Often, the most challenging part for an investigator is discovering the who behind an attack. Is it a coordinated attack orchestrated by a criminal syndicate or an amateur hacker looking for a backdoor into your network? If the actual individual cannot be identified-as is too often the case-then investigators can build a Threat ...

Internet Security Threat Report - 2014 [ Source: Symantec ]

April 2014- In 2013 much attention was focused on cyber-espionage, threats to privacy and the acts of malicious insiders. However the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging threats from cybercriminals continue to loom over businesses and consumers. Eight breaches in 2013 each exposed greater than 10 million identities, targeted attacks increased and end-user attitudes towards social media and mobile devices resulted in wild scams and laid a foundation for major problems for end-users ...

Next 25