Sort results by: Published date | Company name
Showing items 1-25

Guarding the Castle [ Source: Dell ]

December 2014- This ebook details the strategies and tools that cybercriminals use to infiltrate your network and how you can stop them. Today's cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual property. Their threats are often encoded using multifarious complicated algorithms to evade detection by intrusion prevention systems. Once they have exploited a target, attackers will attempt to download and install malware onto the compromised system. In ...

Promise Healthcare Case Study [ Source: Dell ]

December 2014- Promise Healthcare needed to improve security and achieve HIPAA compliance. They were in need of a solution that would deliver a deeper level of network protection and security services without compromising network performance. Promise Healthcare replaced its outdated firewalls with Dell SonicWALL NSA 6600 firewalls. The new firewalls provide robust security services that protect its patients, doctors, nurses and staff and comply with all HIPAA regulations. In addition, the implementation of Dell SonicWALL GMS has allowed ...

Privileged Identity Management [ Source: Gemalto ]

November 2014- Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.

Privileged users exist in every organization and they ...

Prepare For the Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus [ Source: Bit9 ]

July 2014- As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and servers, and security and risk (S&R) professionals have begun to realize this, as evidenced by survey results showing decreased adoption and interest in AV among small and medium-size businesses and enterprises alike.

A growing number of S&R pros are considering replacing their third-party ...

White Paper: Rapidly Respond to Advanced Attacks in Motion with Bit9 + Carbon Black [ Source: Bit9 ]

July 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Enterprises now realize it is no longer a matter of if they will get breached, but rather a matter of when.

Download this whitepaper to understand:

• Typical Response Scenario
• Evolving Enemies
• Kill Chain
• Incident Response Lifecycle
• Security ...

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

July 2014- When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed.

The real challenge is translating complex, technical cyber data into practical information that can be easily understood by the business as well as security pros. Many variables come into play when it comes to understanding cyber risk: your ...

HawkEye G: The Active Defense Grid [ Source: Hexis Cyber ]

May 2014- HawkEye G is a dynamic active defense system designed to leverage existing security assets while providing advanced cyber security analytics and automated countermeasure techniques. The combination of the traditional signature-based and new behavior-based heuristics leads to heightened awareness of standard network activity and deviations that could indicate a potentially disastrous situation. Understanding the full threat and defense landscape is crucial for cyber security mitigation and the HawkEye G team has invested the time and resources ...

Five Things To Do After An Attack The Unique Challenges of Dealing with an Advanced Persistent Threat [ Source: Hexis Cyber ]

May 2014- After an organization been hacked, reducing the amount of time an APT lives within the environment is paramount.

To get the job done organizations must deploy a methodical approach that includes steps to detect/identify, contain - or perhaps not, and remove/recover from the attack as quickly as possible. But the process can't stop there. Attackers are increasingly creative in their methods of attack. To truly gain an advantage against attackers, security ...

Business and the Cyber Threat: The Rise of Digital Criminality [ Source: BAE Systems Applied Intelligence ]

April 2014- Across the world, cyber attacks are now taking place on an industrial scale. The World Economic Forum has warned that the theft of information and the intentional disruption of online or digital processes are among the very top business risks that major institutions face. It also suggests, however, that improved cyber security could save the world economy trillions of dollars.

Recent high profile attacks have highlighted just how much cyber crime can cost ...

Snake Campaign & Cyber Espionage Toolkit [ Source: BAE Systems Applied Intelligence ]

April 2014- This new report from BAE Systems Applied Intelligence provides further details on how the recently disclosed 'Snake' cyber espionage toolkit operates. Timelines of the malware development show this to be much bigger campaign than previously known. Specifically it reveals that the malware has actually been in development since at least 2005. From the complexity of the malware, and the range of variants and techniques used to support its operation, the research also suggests that Snake's authors ...

Endpoint Buyers Guide [ Source: Sophos ]

March 2014- It takes more than antivirus to stop today's advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming.

Download this endpoint buyer's guide and read independent research and test results that will help you determine your endpoint security solution requirements and identify the vendor that best meets your needs

Safeguarding businesses in A Time of Expanding And Evolving Cyber Threats [ Source: Verizon ]

November 2013- Every security breach represents a battle between attacker and target. It's a battle of speed, a battle of skill, and often begins before a potential attacker takes a single physical action.

Over the nine years Verizon has conducted its Data Breach Investigations Report (DBIR), that battleground has continued to evolve. It has become more complex, rife with pitfalls and has opened up new opportunities for surprises.

Attackers remain varied, motivated by ...

Securing Banks in Changing Times [ Source: F5 ]

October 2013- The financial services industry is facing significant pressure from customers, competitors, and governments to secure and improve all types of networked applications while meeting customer demand for increased channel access and complying with new regulations. F5 ADCs can speed compliance and time to market while increasing security on public-facing websites.

12 Things IPS Systems Should Do [ Source: Dell Software ]

August 2013- Do you know what to look for in an intrusion protection system? Read our e-book, "12 Things Effective Intrusion Protection Systems Should Do." Don't leave your organization vulnerable to attacks. The attackers have extremely sophisticated evasion techniques to escape detection. Does your current IPS deliver an effective counter attack? Today's intrusion prevention systems provide advanced security intelligence and the ability to identify and block malware before it can enter your network. Learn how to detect and ...

10 Ways To Securely Optimize Your Network [ Source: Dell Software ]

August 2013- Web 2.0 and social networking applications have created an entirely new set of IT requirements for securing, controlling, and ensuring bandwidth in the new enterprise network. In this e-book, see how you can securely optimize your network with Dell SonicWALL's advanced security platform. It combines core next-generation firewall application intelligence, control and visualization, gateway protection and SSL inspection for enterprises, with WAN acceleration for distributed offices - elements that work seamlessly to maximize security and control. ...

How to Build a Massively Scalable Next-Generation Firewall [ Source: Dell Software ]

August 2013- Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. The paper discusses seven measures of scalability, and how to use them to evaluate NGFWs. The paper also outlines the kind of technical innovations needed to produce a massively scalable NGFW. You'll also see results from a benchmark test comparing the four leading next-generation firewalls. In the most demanding test in the series - scanning SSL traffic with firewall, anti-virus, ...

Fight back against stealthy attacks with security beyond the OS [ Source: McAfee ]

May 2013- Today's anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today's malware developers. Hardware-assisted security products like McAfee Deep Defender take advantage of a "deeper" security footprint.

Researchers discover an average of 2,000 rootkits each day, according to McAfee® Labs™. Rootkits are an increasingly common form of malware built explicitly to hide malicious code. Once installed, a rootkit conceals itself and looks innocent ...

Dennis Technology Labs - Effectiveness in Virtual Environments [ Source: Symantec ]

October 2012- This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.

Cybersecurity in Action [ Source: Guidance Software ]

October 2012- 4 Days, 465 Systems, 3 continents

The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.

Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...

Achieving Compliance in Digital Investigations [ Source: Guidance Software ]

October 2012- 80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report

As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.

This ...

How Three Cyber Threats Transform the Role of Incident Response [ Source: Guidance Software ]

October 2012- “The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System

While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage ...

Finding An Effective Antivirus Solution To Please Users & Administrators [ Source: ESET ]

October 2012- Does your anti-virus bring your systems to a crawl? Is it causing administrators to pull their hair out? This whitepaper shows you how to solve both problems with one product!

Options for Backing Up Your Computer [ Source: ESET ]

July 2012- While personal computers range in cost from a few hundred to a few thousand dollars, a computer is a physical object, and it can be replaced. What really makes your computer valuable is what's unique about it, and that is your data - your business records, pictures, audio and video recordings, and documents you have saved over the years. Read to learn more about how to keep your data safe.

Keeping Secrets: Good Password Practice [ Source: ESET ]

July 2012- Alternative and supplementary forms of authentication have become far more common (and affordable), but the humble password remains the somewhat crumbling gatehouse to many a security structure. Learn how to tighten the weakest link of your security system.

Ten Ways To Dodge CyberBullets: Reloaded [ Source: ESET ]

July 2012- In the frequently changing threat landscape, as cyber-criminals and security companies constantly introduce new techniques and countermeasures, the basic principles of self-defense stay the same, so even while detail changes, the underlying advice remains critical to protection.

Trends for 2012: Malware Goes Mobile [ Source: ESET ]

July 2012- The ways in which people are accustomed to using technology have always influenced and determined malware development and that trend will continue. With the significant growth in the use of mobile devices, malware developers have been working to make these platforms a viable entry point for malicious code infection.

Next 25