Sort results by: Published date | Company name
Showing items 1-25

SaaS Security: Mind the Gap [ Source: Adallom ]

November 2013- This joint paper from EMC and Adallom provides a brief overview of emerging gaps and trust issues common to SaaS providers.

SATA vs. PCIe Solid-State Storage Solutions for MySQL Environments [ Source: HGST ]

December 2014- Database users are increasingly interested in using Flash-based solid-state drives (SSDs) to speed up application performance. For many database administrators (DBAs), increased database performance directly impacts their user experience and bottom lines. Accelerating a single MySQL instance may allow DBAs to avoid painful sharding exercises, with all their attendant administration, application changes, and high capital and ongoing costs. With the wide range of SSDs available today, choosing any one can be difficult. This paper aims ...

IDC Analyst Connection: The Evolving Threat Landscape [ Source: ThreatTrack Security ]

February 2015- Today's cybercrime environment has evolved from quick smash-and-grab tactics to persistent campaigns involving specialized malware. In response, a new category of security technology aimed at detecting, analyzing and preventing such threats is emerging. ThreatTrack Security discussed this trend with Charles Kolodgy, IDC's Research Vice President for IDC's Security Products Service.

Breach Detection: What you need to know [ Source: Bit9 ]

September 2014- Today's cyber attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today's advanced attackers are using to break into your organization and why you require a defense-in-depth cyber-security program that incorporates automatic detection and incident response. The goal of this eBook is to leave you with the knowledge you need to effectively protect your business against today's advanced attacks.

Breach Preparation: Plan for the Inevitability of Compromise eGuide [ Source: Bit9 ]

January 2015- You can't open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches, which included:

Designing a Continuous Response Architecture eGuide [ Source: Bit9 ]

October 2014- Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation.

This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.

How to Stop Social Media Hacks [ Source: Proofpoint ]

February 2015- A how to guide describing the key steps that organizations should take to prevent their social media accounts from being hacked.

Supply Chain in the Cloud: Looking Beyond Total Cost of Ownership [ Source: GT Nexus ]

October 2011- Cloud offers the potential to not only transform how supply chain organizations procure IT capabilities, but also to fundamentally change how they manage business processes.

Whether in the volatility of demand, requirements for shorter lead-times, or the acquisition of new capabilities, the "clock speed" for businesses is running faster and faster for most manufacturers today while the delivery of traditional IT capabilities are struggling to keep up.

This IDC paper illustrates ...

The Internet of Things Supply Chain [ Source: GT Nexus ]

December 2014- Imagine a world where physical objects exchange knowledge and cooperate together like teammates to achieve unparalleled business efficiency. From textile looms to shipping pallets to store shelves, everything in the supply chain would sync, automatically, to optimize operations.

The Internet of Things is bringing about that world at a furious pace—very soon over 26 billion devices of all shapes and sizes will be connected to the Internet. Retailers and manufacturers will face ...

An IDC White Paper: B2B Collaboration Environments – On the Path to Modernization [ Source: Axway ]

February 2015- Today's business environment has reached a level of complexity that is unparalleled in history. With the increasingly global nature of business, a business community that is geographically and technologically diverse, and a general urgency to be flexible enough to respond to market changes, companies from all industries are struggling to compete. This white paper analyzes trends and related steps that companies are taking to evolve, consolidate, and modernize their legacy B2B collaboration exchange environments ...

10 Best Practices for Thriving in an API World [ Source: Axway ]

February 2015- The world is undergoing a series of economic, societal and environmental changes that will require companies to be more innovative and more agile than ever before. Technology can be an enabler for much of this organizational reinvention, with one caveat: the way technology works within the organization also needs to change.

Does Your File Transfer Environment Need Renovation? [ Source: Axway ]

February 2015- 3 reasons (and 4 steps) for consolidating your file transfer infrastructure now! Legacy connections, disjointed file transfer mechanisms, and redundant or expensive VANs/VPNs and FTP servers can cause weaknesses in your file transfer infrastructure, leading to escalated costs, increased risk and even damaged business relationships. This white paper details how consolidating your file transfer infrastructure can save money and drive core revenue, reduce complexity and risk, and improve service.

An Ovum White Paper: The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements [ Source: Axway ]

February 2015- 1 out of 4 organizations have failed a security audit. Will you be one of them? Ovum Consulting asked hundreds of executive-level IT buyers from around the world some very tough questions about their ability to govern the flow of their enterprise data. Their answers may surprise you. For instance: 23% of respondents had failed a security audit within the last three years; 17% had “no confidence” they could pass such an audit using their existing file transfer solutions; ...

Driving Growth with the Anytime-Anywhere Mobile Workforce [ Source: Good Technology ]

February 2015- Successful businesses are empowering their employees to complete vital business transactions any time of day or night--wherever they are. Mobility is transforming sales processes, optimizing customer visits, speeding sales cycles, improving manufacturing operations and increasing customer satisfaction. Read this paper to learn how to grow productivity and competitiveness with secure enterprise mobility solutions.

Gartner Report: Combining Mobility and Business for Success [ Source: Good Technology ]

February 2015- Business today is done in mere moments-and mobility gives you the tools you need to turn those "business moments" into business success. Read this Gartner report to learn how to capitalize, while also adhering to stringent privacy and legal standards.

Gartner Mobility Report: Assess, Model, Strategize and Innovate [ Source: Good Technology ]

February 2015- The transition to mobile can be chaotic-but as mobility becomes a business standard, you have to have a secure mobility strategy to enable a smooth implementation. Read Gartner's Mobile Maturity Model to learn how to move confidently through your mobile journey.

Mobility Report: Are You Keeping Pace with Your Peers? [ Source: Good Technology ]

February 2015- Mid-market companies are the growth engine of today's economy; they're growing-and hiring-much more quickly than their enterprise cousins. And this breakneck growth makes mobile productivity critical. Learn what your peers are doing and where you rank on mobility adoption.

5 Critical Steps to Securely Manage Mobile Apps and Devices [ Source: Good Technology ]

February 2015- Mobile adoption at work is mainstream. From the casual user who wants to check business email to the field technician carrying a mobile tablet to the customer site, the use cases addressed by mobile are wide ranging. IDC predicts that 1 billion devices are coming to the work place by 2017, presenting both a formidable challenge and a tremendous opportunity for businesses. Find out the 5 critical steps to securely manage mobile apps and devices.

Bank Strengthens Mobile Security, Lowers Costs and Enhances Customer Service [ Source: Good Technology ]

February 2015- With a mission of putting customers first, CommunityOne IT continually evaluates new technologies that help employees work smarter and provide better service to customers. Learn how this $2 billion community bank was able to lower costs and enable secure BYOD, while improving productivity with new mobile apps.

Mobile Workflows that Enhance Productivity: 8 Use Cases [ Source: Good Technology ]

February 2015- Financial Services companies everywhere are moving beyond the basics of mobility to deliver sophisticated mobile workflows that connect employees with each other, their partners and their customers. Read this paper to see eight secure mobile workflow use cases being used by organizations of various industries that enhance productivity.

Insurance in the Cloud: A Customer Focused Approach to Innovation [ Source: Bluewolf ]

July 2014- 72% of financial services companies will increase their cloud-related budget this year.

Learn how insurance companies like The Standard and The Hanover Insurance Group are overcoming industry challenges and leveraging cloud technology to quickly and effectively:

Trend Advisor: Hacking Crisis Highlights 'Crypto Chaos' [ Source: Certes ]

January 2015- IT departments were battered by a cyber security perfect storm in 2014. While the security community was still rolling in the wake of the Target breach in late 2013, the continuing parade of breaches in 2014 cast a harsh light on inadequate security architectures and poorly implemented security practices.

Securing Enterprise Applications [ Source: Onapsis ]

November 2014- Business-critical platforms such as SAP and Oracle have been in place for more than a decade, however a majority of firms using these applications currently have gaps in their security program. There are many reasons for these security gaps ranging from a reliance on generic security tools, to IT teams lacking complete understanding of how application platforms work.

Implementing SAP Security Solutions [ Source: Onapsis ]

January 2015- Gaps in security practices of business-critical applications running on SAP are causing organizations to rethink their current approach and embrace a new strategy.

The SAP Security Survival Guide [ Source: Onapsis ]

January 2015- As a CISO, learn which questions to ask in order to uncover security challenges facing your SAP systems.

Next 25