Sort results by: Published date | Company name

Evaluating Managed File Transfer in the Cloud: What You Need to Know [ Source: Ipswitch File Transfer ]
December 2012- As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs of each. And this decision does not need to be "either-or"; for many companies an enterprise solution for managing secure file transfer encompasses both cloud hosted and on-premise options.

This white paper from Osterman Research details advantages to consider for managing file transfer operations in the cloud, and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

A New Breed of Information Security Leader: The Hyper-Connected Era and What It Means for CIOs and CISOs [ Source: IBM ]
December 2012- 2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?

[WHITE PAPER]
Read Abstract | Go to White Paper

Close Encounters of the Third Kind [ Source: IBM ]
December 2012- This white paper presents the results of a research study on the prevalence of client-side JavaScript vulnerabilities, conducted by the IBM Security (formerly, IBM Rational) application security team. For this study, the researchers used IBM JavaScript Security Analyzer (JSA) technology, which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. This kind of analysis is superior to and more accurate than regular static ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Your Organization Has Just Been Attacked by Malware - Now What? [ Source: Sourcefire ]
December 2012- Jumping the gun? Maybe. But odds are it will happen.

Be ready with your Advanced Malware Survival Kit.

Download our Incident Response Brief: 4 keys to effective malware response From there, access:
• Videos: See the power of malware visibility and control from the network to end-devices
• Special Offer: 100 Free Seats of advanced malware protection

Download the Advanced Malware Survival Kit Now and be prepared before the next attack!

[WHITE PAPER]
Read Abstract | Go to White Paper

3 Strategies to Protect Endpoints from Risky Applications [ Source: Dell KACE™ ]
November 2012- Cyber criminals have started to look for greener pastures—namely among third-party applications. Reduce the risk profile of PC and server operating systems and protect endpoint security from risky applications. Read the white paper today.

[WHITE PAPER]
Read Abstract | Go to White Paper

The Quest for a Cloud Integration Strategy [ Source: Dell Boomi ]
October 2012- Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high costs of purchasing and implementing integration solutions.

Fortunately, the development of SaaS applications has leveled the playing field in terms of affordability but it has also changed the integration game significantly, due to the unique characteristics of the model itself.

SaaS applications are very cost effective, until their data is needed elsewhere ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Bloor Research: The Economics of Cloud Managed Integration [ Source: Dell Boomi ]
November 2012- Application and data integration doesn't have to be slow and expensive. New cloud-based integration platforms dramatically speed results and lower costs, as outlined in this new report by Bloor Research. In this paper, you'll learn how Cloud Managed Integration:

   • delivers 2.5 times faster time-to-value
   • has nearly 40% lower total-cost-of-ownership (TCO)
   • is speeding results at AAA, Brady and Panasas

[WHITE PAPER]
Read Abstract | Go to White Paper

Three Steps to Mitigate Mobile Security Risks [ Source: Rapid7 ]
November 2012- Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices present to their corporate data.

This white paper highlights key mobile security risks and describes how pervasive they are based on data from ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance [ Source: Rapid7 ]
November 2012- The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance.

When you download this free eBook, ...

[WHITE PAPER]
Read Abstract | Go to White Paper

EMA™ Radar for Hybrid Cloud
Integration Technologies
[ Source: Dell Boomi ]
November 2012- In this EMA Radar Report, Enterprise Management Associates evaluates seven of the leading vendors of cloud integration platforms, for the value they offer organizations in cloud to cloud, cloud to on-premise and on-premise to on-premise application integration use cases.

Evaluations were conducted according to extensive criteria in Functionality, Deployment and Administration, Architecture and Integration, Cost Advantage, and Vendor Strength, giving prospective customers a wide-ranging view of leaders in this market.

[WHITE PAPER]
Read Abstract | Go to White Paper
View All