Sort results by: Published date | Company name
Showing items 1-25

Reducing Expenses Starts With the Programming Skills of Operations Groups [ Source: F5 ]

July 2014- Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today's new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the technology industry looks obsessed with the idea of automation, continuous delivery and programmability. With good reason, because the evidence is all around us-saving time is ...

The F5 ADC is a Platform, Not a Product [ Source: F5 ]

July 2014- Platforms are a key success factor whether we're talking about phones or cloud or Application Delivery Controllers (ADCs). F5's offering-TMOS-has been a platform supporting an extensible ecosystem of application-focused "apps." Over the past 10 years, the ADC market has continued to experience growth with the upper limit on the ADC market constrained only by current definitions. Thus, the ADC must be a platform and not a product to continue to adapt to the needs of ...

DNS Challenges in a Changing Landscape [ Source: F5 ]

July 2014- IDG Research Services surveyed DNS administrators from large organizations to understand the challenges of deploying an available, secure, high-performance DNS infrastructure. Download the infographic to understand the key issues you need to think about to ensure your DNS servers don't fail.

Web App Acceleration: Practical Implementations [ Source: F5 ]

July 2014- Web application acceleration implementations use combinations of three key acceleration principles: 1. Send data as efficiently as possible; 2. Send data as infrequently as possible; and 3. Send as little data as possible. Different combinations can produce very different results and, more importantly, they can require dramatically different investments in time and resources. To decide on the best practical implementation of acceleration technologies for a particular organization, it is important to explore how each implementation employs the key ...

Three Key Principles to Accelerating Web Applications [ Source: F5 ]

July 2014- Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about ...

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

July 2014- Cybersecurity for the enterprise. There is no silver bullet. But as business becomes more connected and as data moves further outside the organizational walls, enterprises need look at weaknesses in the security chain - and a good place to start is in the supply chain.

Small businesses sit on the "front lines" in the round-the-clock cybercrime battle. Think about how many small businesses, suppliers and customers have access to different areas of an ...

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

July 2014- The market for cyber liability insurance has been around for over a decade, but only recently has it experienced a spike in demand. The variety of recent high-profile data breaches have cast light on the importance of having coverage should a cyber-attack strike a business. No business is immune to a cyber-attack, which can wreak havoc not only on the IT environment, but also on the bottom line.

Despite all of this, cyber ...

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

July 2014- When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed.

But when it comes to cybersecurity, the complex and often technical world of cybersecurity needs to be transformed into practical information that can be easily understood by the business as well as security pros. Many variables come into ...

Three Guiding Principles for Data Security and Compliance [ Source: IBM ]

July 2014- The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target - as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.

Because data is a critical component of daily business operations, it is essential to ensure privacy ...

Top 3 Myths about Big Data Security: Debunking Common Misconceptions about Big Data Security [ Source: IBM ]

July 2014- Data volumes are growing rapidly with no end in sight. Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.

Top Tips for Securing Big Data Environments: Why Big Data doesn't have to mean Big Security Challenges [ Source: IBM ]

July 2014- Big data environments create significant opportunities. However, organizations must come to terms with the security challenges they introduce, for example big data environments allow organizations to aggregate more and more data - much of which is financial, personal, intellectual property or other types of sensitive data - most of the data is subject to compliance regulations.

As big data environments ingest more data, organizations will face significant risks and threats to the repositories ...

Integrating and Governing Big Data [ Source: IBM ]

July 2014- While the term "big data" has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades, leading the way with data integration, management, security and analytics solutions known for their reliability, flexibility and scalability. The end-to-end information integration capabilities of IBM InfoSphere Information Server are designed to help organizations understand, cleanse, monitor, transform and deliver data - as well as collaborate to bridge the gap between ...

Intelligent Compliance - Establishing Trust in the Datacenter [ Source: BMC Software ]

July 2014- With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. It only takes one breach and the cost to your organization can spiral out of control.

In this whitepaper, you will discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Through the Intelligent Compliance process, you ...

Top 10 Things Every Web Application Firewall Should Provide [ Source: Imperva ]

July 2014- Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Why?

• Hackers evade traditional network security defenses to take down websites and to steal data.

• Malicious users probe websites around-the-clock looking for vulnerabilities.

• Automation tools such as off-the-shelf attack toolkits and botnets make it easy to execute large-scale attacks.
Web application firewalls have become the central platform for protecting applications against ...

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

July 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...

Network Transformation: A Guide to Planning Your Journey to All-IP [ Source: Neustar ]

July 2014- Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

July 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

Forensic Domain Mapping: How to Reverse Engineer Domain Ownership in a Cyber Investigation [ Source: DomainTools ]

July 2014- For investigators tasked with identifying the perpetrator of online fraud, it's often the little things that can make the difference. Cyber investigators must work diligently to ferret out the smallest details in order to snare their quarry. Investigating a digital crime is not so dissimilar as investigating a crime in the 'real world'. While popular TV shows might have you believe that a single fiber found at the scene of a crime will lead directly ...

Domain Attribution: Piercing the Veil of Masked Domain Owners [ Source: DomainTools ]

July 2014- As the Internet has evolved to become a primary channel of trade and commerce, so has the sophistication of criminal organizations and other perpetrators of fraudulent schemes who take advantage of domain privacy features as a means by which to mask their true identity. Domain privacy, a controversial topic since its introduction in 2003, provides domain owners with the option to substitute the registrar's contract information for their own. While there are a variety of legitimate ...

Best Practices Guide: Using DNS Data for Threat Intelligence and Incident Forensics [ Source: DomainTools ]

July 2014- Cybercrime represents a major threat to both government and businesses, costing the economy hundreds of billions of dollars in losses every year. Often, the most challenging part for an investigator is discovering the who behind an attack. Is it a coordinated attack orchestrated by a criminal syndicate or an amateur hacker looking for a backdoor into your network? If the actual individual cannot be identified-as is too often the case-then investigators can build a Threat ...

Internet Security Threat Report - 2014 [ Source: Symantec ]

April 2014- In 2013 much attention was focused on cyber-espionage, threats to privacy and the acts of malicious insiders. However the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging threats from cybercriminals continue to loom over businesses and consumers. Eight breaches in 2013 each exposed greater than 10 million identities, targeted attacks increased and end-user attitudes towards social media and mobile devices resulted in wild scams and laid a foundation for major problems for end-users ...

Integrating the Network and Endpoints to Detect Unknown Threats [ Source: Symantec ]

April 2014- Modern day attackers are launching increasingly more sophisticated, targeted attacks designed to evade signature-based security technologies. Despite having made significant investment in a range of protection technologies, security leaders still wonder whether their network has been infiltrated, how far the threats have spread and which assets have been compromised.

The traditional approach of relying on disparate network and endpoint protection technologies is no longer enough. Detecting advanced targeted attacks requires an integrated, multi-layered ...

The Cyber-Resilient Enterprise: Harnessing Your Security Intelligence [ Source: Symantec ]

April 2014- This paper details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it. Finally, it paints a picture of the future of security.

The Public Sector Cloud Perspective [ Source: DLT Solutions ]

July 2014- Over the past decade, there have been several technology revolutions that have improved the way the public sector agencies do business-from client/server computing to virtualization, from virtualization to the Internet, and from the Internet to today's cloud computing. Learn what David Blankenhorn, Chief Cloud Technologist at DLT Solutions, has to say about the role of cloud computing, and how PaaS in particular plays in helping public sector agencies become more flexible and efficient while ...

Consolidate and Simplify Your Security Environment [ Source: SwishData ]

July 2014- How can federal organizations stay ahead of today's sophisticated, fast-changing threats, particularly when budgets are tight? It's not that agencies lack protections. Most have put in place strong perimeter defenses and other security tools, but they cannot simply stand pat against threats that are constantly devising new ways to evade defenses, compromise networks, and exfiltrate data. Agencies must be equally agile in countering evolving cyber threats. Doing so requires that they find ways to ...

Next 25