Sort results by: Published date | Company name
Showing items 1-25

Best Practices for Security and Compliance with Amazon Web Services [ Source: Trend Micro ]

February 2014- Amazon Web Services (AWS) has set high standards for the entire Infrastructure as a Service (IaaS) industry by building a solid foundation with comprehensive administrative, physical and logical controls - from strict policies for physical access to its data centers, to well thought-out configuration change management procedures. However, a secure foundation is just the start and to build an end-to-end secure computing environment, organizations must take an active role in protecting systems, applications and data ...

The Rising Threat Of Corporate Cybercrime: Cybercriminal Motives and Methods [ Source: Trusteer ]

October 2013- Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to corporate information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the corporate network than a direct network attack. Our latest white paper discusses the cybercriminal motives and methods, and presents the need for Enterprises to recognize this growing danger and implement technologies that effectively prevent malware, the root ...

Website Security Statistics Report [ Source: Whitehat Security ]

October 2013- WhiteHat Security's Website Security Statistics Report provides a one-of-a-kind perspective on the state of website security and the issues that organizations must address in order to conduct business online safely.

Website security is an ever-moving target. New website launches are common, new code is released constantly, new Web technologies are created and adopted every day; as a result, new attack techniques are frequently disclosed that can put every online business at risk. In ...

Best Practices to Make BYOD Simple and Secure [ Source: Citrix ]

August 2013- Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. BYOD enables people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner. This white paper provides guidance for selecting technologies and developing policies to introduce a BYOD initiative. Download the white paper

Top 5 requirements for secure enterprise file sync and sharing [ Source: Citrix ]

August 2013- IT organizations today face an urgent need to get control over file sync and sharing in the enterprise. To achieve productivity gains people have been adopting ways to easily share files, access them from anywhere and sync them across devices-often exposing the organization to serious security and compliance risks. To address the data access, sync and sharing challenge effectively, this paper presents the top 5 requirements that IT should look for in an enterprise data sync ...

Switching Managed SSL Service Providers [ Source: GMO GlobalSign Ltd ]

May 2013- Switching to a new Certificate Authority for your SSL Certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. The key to success is setting expectations and preparing yourself and others for what's involved, in terms of resources and costs.

This white paper aims to help organisations make an educated choice about their enterprise SSL needs by outlining the key aspects to take into ...

Switching Managed SSL Service Providers [ Source: GMO GlobalSign Ltd ]

May 2013- Switching to a new Certificate Authority for your SSL certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. The key to success is setting expectations and preparing yourself and others for what's involved, in terms of resources and costs.

This white paper aims to help organizations make an educated choice about their enterprise SSL needs by structuring the main considerations to keep in ...

Websense 2013 Threat Report [ Source: Websense ]

May 2013- Conventional information security measures, including anti-virus and next-generation firewalls, aren't enough to protect your organization from today's deluge of sophisticated web threats.

That's just one of the key findings in the "Websense® 2013 Threat Report." Based on data collected by the Websense ThreatSeeker® Network, the world's largest and longest-standing security intelligence network, the Report details how advanced threats are specifically targeting mobile devices and social media, and rendering traditional security solutions ineffective.

Fight back against stealthy attacks with security beyond the OS [ Source: McAfee ]

May 2013- Today's anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today's malware developers. Hardware-assisted security products like McAfee Deep Defender take advantage of a "deeper" security footprint.

Researchers discover an average of 2,000 rootkits each day, according to McAfee® Labs™. Rootkits are an increasingly common form of malware built explicitly to hide malicious code. Once installed, a rootkit conceals itself and looks innocent ...

Combating Advanced Persistent Threats Through Detection [ Source: Seculert ]

April 2013- Organizations are discovering that effective Advanced Persistent Threats (APTs) protection is a critical priority. Without APT protection, organizations are vulnerable to potentially devastating malware attacks that could last for months or years before they're identified.

A Guide to Implementing a Successful SAST Tool and Solving Developer Security Issues [ Source: Checkmarx ]

April 2013- Recognizing security defects early in the development cycle have traditionally posed real challenges for developers as current static analysis tools often generate significant false positive results and other major issues. Next generation tools address these issues by integrating static analysis as part of development teams’ normal ‘design, code, test and analysis’ processes. Download, “A Successful SAST Tool Implementation” to learn how these tools can:

•  Integrate with normal software engineering workflows
•  Accurately report ...

Enterprise Application Security: A Guide to Choosing Between Binary and Source Code Analysis [ Source: Checkmarx ]

April 2013- Software security is a top priority for many organizations with many considering how they should integrate security earlier on in the software development lifecycle. A process change like this would benefit organizations in the form of reduction in costs and increased productivity as a result of minimizing flaws and removing defects via software patches. Download, “Enterprise Application Security: Source vs. Binary Code Analysis” to learn about the benefits of Source Code Analysis (SCA) and how ...

A Secure Cloud: Is There Such a Thing? [ Source: VMware ]

January 2013- A secure cloud is attainable. In fact, industry luminaries David Hunter of VMware and Arthur Coviello of EMC say clouds can be more secure than physical infrastructure. These professionals explain how to keep your cloud secure and the security solutions offered by VMware and RSA.

2012 NSS Labs Next-Generation Firewall Product Analysis Report [ Source: Sourcefire ]

October 2012- Looking to separate hype from reality when it comes to Next-Generation Firewalls?

Look no further.

NSS Labs, the trusted authority in independent product testing, recently evaluated the Sourcefire FirePOWER 8250 in the industry's most rigorous NGFW testing available to date.

The Sourcefire FirePOWER™ 8250 NGFW set a new standard in security effectiveness, performance and value:
•  protection against all attacks
•  firewall enforcement
•  application control
•  identity/user awareness
•  ...

DDoS for Dummies [ Source: Corero ]

October 2012- A Distributed Denial of Service (DDoS) attack against your organization’s network and systems can bring your online business to a grinding halt, costing you hundreds of thousands – even millions – of dollars, ruining your brand, and driving away your customers.

Far too many organizations are ill-prepared to deal with the effects of DDoS attacks and other Internet security threats. They rely on traditional security devices including firewalls, intrusion prevention systems (IPS) and other ...

Four Keys to Effective Next-Generation Security [ Source: Sourcefire ]

July 2012- Today's targeted threats are often multi-vectored and exploit unknown vulnerabilities - their sophistication defying typical signature-only based inspection. Whether APTs or client-side threats, they use evasive techniques to penetrate our organizations, often purporting to be or riding on applications and exploiting trust relationships with which we've grown all too comfortable with.

To make matters worse, attackers have realized the inadequacies of traditional signature-based approaches and have accelerated the pace of change and obfuscated ...

The 5 New Laws of Anti-Malware [ Source: Sourcefire ]

July 2012- Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.

If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

Current research suggests as much as 75% of new viruses are ...

The Case for the Next-Generation IPS [ Source: Sourcefire ]

July 2012- A Next-Generation IPS (NGIPS) offers a logical and essential progression of capabilities needed to protect networks from emerging threats. Pioneered by Sourcefire®, and now endorsed by Gartner, the NGIPS builds on typical IPS solutions by providing contextual awareness - about network activity, systems and applications, people, and more - to promptly assess threats, ensure a consistent and appropriate response, and reduce an organization?s security expenditures.

The purpose of this paper is:<...

Endpoint Protection: Multilayer Security from Intel and McAfee [ Source: Intel ]

July 2012- McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.

Four Steps to Defeat a DDoS Attack [ Source: Imperva ]

June 2012- DDoS attacks, aided by off-the-shelf tool kits and simple automation techniques have become the weapon of choice for both financially-motivated cyber criminals and hyper-politicized "hacktivists." Organizations of all sizes must recognize that they are potential targets for the next massive DDoS barrage. Fortunately, there are some key counter-measures that can be employed to protect your organization.

Read this paper to understand the critical security techniques your organization needs to take in order to ...

Defending Against Advanced Persistent Threats [ Source: Solutionary ]

February 2012- Advanced Persistent Threats or APTs are a class of highly sophisticated, targeted attacks. Since the publicity associated with the January 2010 news that numerous large organizations in the Internet, finance, technology, media, and chemical sectors had been targeted by APTs, this style of attack has received a great deal of attention. Since 2010, numerous APT attacks have been publicly acknowledged by organizations of in the software, security, defense and other industries. The wide range of industries these ...

Hosted Email: How to Build in Security, Compliance, and Redundancy [ Source: Symantec.cloud ]

November 2011- Because of the mission critical nature of email and electronic documents, the idea of moving core productivity products - namely email and office tools - to the cloud seemed like an unlikely prospect even a few years ago. Now, strong offerings from Google and Microsoft have made the switch a reality for many organizations. However, even with the backing of such large companies, these hosted products are not perfect. Like other hosted products, there are ...

MPLS: Future Proofing Enterprise Networks for Long-Term Success [ Source: CenturyLink ]

November 2011- Today's enterprises face a complex networking environment, often with multiple network protocols. Read this IDC Executive Brief to see how multiprotocol label switching (MPLS) facilitates cost-effective and converged wide area networking with a high level of security, management, and flexibility.

Data Protection and Your Customers [ Source: CenturyLink ]

November 2011- As businesses look to improve customer experiences with interactive kiosks, and mobile applications and payment options, they must also ensure that customer data is protected against security breaches. See how Payment Card Industry compliance can keep customer data safe and strengthen your business.

Delivering the Web Access Your Users Want with the Control You Need [ Source: Blue Coat ]

November 2011- The emergence of social media as the mainstream communications environment has driven business and personal usage of many web 2.0 applications including video, email, chatting, and blogging. This creates a business imperative to allow, but control, web 2.0 applications - most significantly social media usage.

In the current complex and dynamic web environment, achieving the required control of web access starts with an accurate, dynamic and granular content filtering database. Blue Coat WebFilter content filtering, ...

2011 Mid-Year Security Report [ Source: Blue Coat ]

November 2011- Innovation breeds opportunity, even for the underground. Web and mobility innovations focus on ease of use, availability, and building large user audiences, but they breed opportunity for cybercrime. Security typically comes later, after a period of breaches and security issues put the issue front and center. Halfway through 2011, we are in the midst of this security period.

The majority of web threats are now delivered from trusted and popular web sites that have ...

Next 25