Sort results by: Published date | Company name
Showing items 1-25

No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers [ Source: ThreatTrack Security ]

October 2014- C-level executives regard the role of CISO primarily as a target for finger-pointing in the event of a data breach, and have little faith that individuals in the role could hold other leadership positions.

Prevent Data Breaches with Stronger Email Security [ Source: ThreatTrack Security ]

October 2014- Email remains the #1 threat vector for many organizations. To fight the onslaught of cyber threats, nothing short of a multilayered security architecture, backed by strict security policies and staff training, can protect an organization.

Leveraging Metadata for a Proactive Defense [ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]

October 2014- All too often network security professionals are forced into an escalating workflow-an arms race remediating alerts (indicators of attacks) as they come in, instead of proactively hunting for the adversary-who is likely already in your network. Resource and time constraints, as well as a lack of visibility and the right tools, lead to a best effort security posture (doing everything you can to stay above the rising tide of incoming attacks).

Access to ...

Comprehensive Advanced Threat Defense [ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]

October 2014- The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it is the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses.

We like to define advanced threat defense in terms of the adversary rather than the ...

Continuous Delivery: What It Is and How to Get Started [ Source: Puppet Labs ]

November 2013-

You've probably heard that continuous delivery allows you to get new features and capabilities to market quickly and reliably. But what is it, really, and what's required to get started? This introductory ebook reveals:


2014 State of DevOps Report [ Source: Puppet Labs ]

July 2014-

The 2014 State of DevOps report--based on a survey of 9,200+ people in IT operations, software development and technology management roles in 110 countries--reveals:


Automated Configuration Management: Why it Matters and How to Get Started [ Source: Puppet Labs ]

August 2014-

Configuration management is a critical cornerstone of IT automation, providing tools that allow you to centrally manage the packages, configuration files, process state, firewall rules and other settings that equip servers to do their assigned jobs. Without automated configuration management, you do all these tasks manually, or with handwritten scripts. It's time-consuming, and prone to human error.


Configuration management is also about making any changes to the system in an organized ...

Cloud: The Future of Business Communication [ Source: Comcast ]

October 2014- Cloud-based communications means various things to various people, but the only definition that matters is the one that suits your needs. This UBM Tech ebook explores cloud-based voice services that keep employees and customers connected - no matter how technology changes.

Three Ways To Deliver Safer and More Secure Automative Software [ Source: Rogue Wave Software ]

October 2014- Millions of lines of software code are driving the latest innovations in today's vehicles. However, with software-driven innovation comes the reality of coding defects, safety failures, and the potential to become a target for hackers. This paper outlines three important steps that embedded automotive software teams can follow to identify critical coding errors, functional safety issues, and protect their software against malicious attack.

Mobile App Development: Moving From Good to Great [ Source: IBM ]

October 2014- Great mobile app development leads to more than a compelling user interface. In fact, the majority of the cost and effort happens behind the UI, including testing, integration, security, quality assurance, and ongoing management. Also, with security and data integration becoming especially important for an enhanced user experience, many companies are turning to integrated and collaborative mobile application development environments to meet these business requirements and exceed customer expectations.

Security incident response plan that actually works [ Source: IBM ]

October 2014- This brief offers a look at the top ten mistakes security organizations make with their Computer Security Incident Response Plans.

Before the breach [ Source: IBM ]

October 2014- Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.

Gaining the upper hand in today's cyber security battle [ Source: IBM ]

October 2014- Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.

The Individual Enterprise-How Mobility Redefines Business [ Source: IBM ]

October 2014- The mobility revolution is impacting every aspect of our lives, both personal and professional. But many businesses are seriously underestimating the full impact of this burgeoning transformation. Read the white paper "The Individual Enterprise to find out why IBM believes that the time has come for organizations of all sizes, in all industries, to consider the true potential of mobile. By combining the power of analytics with the ubiquity of mobile, your organization has the ...

The "Upwardly Mobile" Enterprise [ Source: IBM ]

October 2014- When IBM and Oxford Economics surveyed 600 organizations about their current and future mobility strategy, they found that most had not put the necessary building blocks in place to realize the full advantages that mobile technology can deliver. Read the white paper to learn how organizations are using mobility to improve the customer experience; enable a more productive workforce; and deliver on new and innovative value propositions in the marketplace. The paper also reveals how mobile ...

Four Key Trends Impacting Mobile Infrastructure Strategy [ Source: IBM ]

October 2014- As mobile technology evolves, it's bringing rapid change to enterprises everywhere, so it's essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of ...

Resilience in the Era of Enterprise Cloud Computing [ Source: IBM ]

October 2014- The veritable explosion of cloud-based IT and business solutions combined with rising demand for mobility and social connection has brought with it a world of new resiliency and continuity challenges. Today IT is expected to deliver "always-on, always-available" service and assure the continuous accessibility of systems and data for an increasingly demanding user community. Resiliency strategies must address the evolving nature of IT, specifically the impact of three disruptive technologies: cloud computing, big data and ...

Building the Business Case for Continuity and Resiliency [ Source: IBM ]

October 2014- Now available: the cost data you need to build the business case for improved continuity and resiliency. Based on findings from the largest study of its kind-the IBM Global Study on the Economic Impact of IT Risk-which surveyed 2,136 IT professionals around the world, 1,069 of them business continuity professionals. Uncover what these business continuity professionals have to say about the IT threats that cause business disruptions, and what these disruptions cost. Then use the IBM trend ...

Aligning IT with Strategic Business Goals [ Source: IBM ]

October 2014- This paper discusses how to develop and implement risk management metrics that examine IT risk in light of IT threats' potential to effect overall business operations and strategic goals.

The Data Center Impact of Cloud, Analytics, Mobile, Social and Security [ Source: IBM ]

October 2014- An IBM white paper describing the infrastructure implications of today's converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.

Redefining Networks for Cloud, Analytics, Mobile, Social and Security [ Source: IBM ]

October 2014- Much has been written about cloud, big data and analytics, mobile, social, and IT security as significant forces that are transforming information technology and business. Much less has been said about the impact of these forces on networking-or about the role that networks play when business initiatives are based on them. As these technologies move from future trend to mainstream, the network as the common, critical infrastructure component will get close to the breaking point.? ...

Big Data U: Exploding Volumes, Complex Control [ Source: IBM ]

October 2014- This five-part InformationWeek University track guides IT pros looking to get their data under control and working for the business. Sessions cover everything from master data management basics to infrastructure, security, governance and advanced analytics. Read this summary to learn more about Big Data.

Top 5 Questions to Ask about your 10GBE data center [ Source: ITG ]

January 2014- The data center has historically been the focal point of technology evolution. Over the past decade, application architectures, servers, and storage have all changed the way services are provisioned and delivered. The foundation of the data center—the network itself—is now experiencing a similar level of change, evolving from the architectures of the past to a more agile and dynamic solution that meets the requirements of today's applications.

IPFS Implements Desktop Virtualization to Meet Needs for Security, Centralized Management, and Cost-Efficiency [ Source: HGST ]

October 2014- In response to recent growth in the premium finance industry and an expanding workforce, Imperial PFS recently leveraged a VMware Horizon View virtual desktop infrastructure (VDI) deployment to cost-effectively scale their business. The addition of HGST FlashMAX II storage devices allows IPFS to meet their need for fast response times and increased performance.

Improving SLAs with Faster Processing Powered by HGST FlashMAX II and HGST Virident Share Software [ Source: HGST ]

October 2014- HGST Virident Share software allows a RAC cluster to use FlashMAX II PCIe SSDs inside the database servers as a shared primary storage, a unique capability in the industry for PCIe flash cards. Learn more.

Dell Cloudera Enterprise Apache Hadoop Distribution [ Source: Dell / Intel® ]

October 2014- With the explosive growth in data volumes and complexity, organizations are finding that managing these vast amounts of unstructured data exceeds the capacity and capabilities of traditional data intelligence systems. In response, many companies are turning to the open source Apache Hadoop platform for the scalability, flexibility, and economics. Learn how the Dell Cloudera Apache Hadoop Enterprise delivers the core elements of Hadoop-scalable storage and distributed computing within a turnkey solution, ready for enterprise development-without ...

Next 25