Sort results by: Published date | Company name
Showing items 1-25

Open Source Software -Security Risks and Best Practices [ Source: Rogue Wave Software ]

January 2015- Third-party applications, including open source software (OSS), make up an increasing proportion of enterprise applications. By some estimates, up to 80 percent of the source code in many new commercial applications is open source. It is easy to understand why. OSS allows developers to build applications faster, adding functionality without writing source code from scratch. Open source communities provide new features, shortening time to market and helping organizations gain competitive advantage.

Open source can ...

The Business Case for Earlier Software Defect Detection and Compliance [ Source: Rogue Wave Software ]

January 2015- By providing developers with the right tools to detect, understand, and fix problems early, your business can simplify software development, shorten development lifecycles, and improve the quality of software code. The end result is increased innovation, secure applications, and a faster time to market - all at a lower cost. Read this whitepaper to learn more.

Protect Your Applications - and Reputation - with Symantec EV Code Signing [ Source: Symantec ]

January 2015- For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code.

Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process ...

Protect Your Brand Against Today's Malware Threats with Code Signing [ Source: Symantec ]

January 2015- The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and ...

Protecting Android Applications with Secure Code Signing Certificates [ Source: Symantec ]

January 2015- Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.

Group Encryption Whitepaper [ Source: Certes ]

December 2014- Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along with increased regulatory pressure to protect their data, encryption of data in motion has gone from a "nice to have" technology to a critical budgeted project. However, companies that have deployed IPsec VPNs across their network have discovered that while encryption is a great mode of data ...

A New Set of Network Security Challenges [ Source: Dell ]

December 2014- This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With two issues becoming increasingly crucial, IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall-smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. Within that mandate, however, lie several other challenges, ...

How Traditional Firewalls Fail [ Source: Dell ]

December 2014- Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help you counter today's threats, manage web 2.0 apps and enforce acceptable-use policies. If your company has a traditional firewall, it is probably jeopardizing your security and costing you money. Firewalls are an essential part of network security, but most are very limited. They can close unneeded ports, apply routing rules to packets ...

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: RSA, The Security Division of EMC ]

November 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

ESG Reviews the Processes and Technologies Required for Effective Incident Detection and Response Today [ Source: RSA, The Security Division of EMC ]

November 2014- Learn what CISOs can do to better protect their organizations from security breaches, and why a big data security analytics architecture is necessary for threat detection and response.

Master Mobile By Focusing on Productivity [ Source: Box ]

November 2014- View this infographic and learn how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective. By mastering mobility, IT teams play a key role in boosting productivity, efficiency, and ROI across the business.

Empowering Your Mobile Workers - 4 Criteria for Secure Collaboration [ Source: Box ]

November 2014- Download this whitepaper to learn how to build a mature mobile strategy and the top 4 criteria for secure collaboration. Today's most productive employees are not tied to a desk, an office, or a location. These top producers are experts at finding new tools, new apps, and new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with ...

Single Sign-On: with Passwords, Less is More [ Source: NetIQ ]

September 2014- Your workforce is using more applications from a wider variety of sources than ever. This causes security issues as users forget passwords, share them or write them down. Single sign-on (SSO) is a quick way to solve this problem. Now is the perfect time to implement SSO. This paper will explain SSO options and questions you should ask to determine the right solution for you. Security and productivity are both at stake: put SSO to ...

Mobile and Remote Access: Balancing Productivity and Security in a BYOD World [ Source: NetIQ ]

September 2014- In today's BYOD world, securing access and maintaining productivity is challenging; users want access from their own devices, and the applications, data and services they're accessing aren't inside the perimeter. But even in this environment, you can secure access. Read this paper to learn how you can implement access controls that keep up with the modern world. Get advice on how to take stock of your environment, leverage your current investments and keep your access ...

Is Your Identity and Access Governance Program Vulnerable to Risk? [ Source: NetIQ ]

September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...

Managing the Consumerization of IT [ Source: NetIQ ]

May 2014-

Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.


It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...

Managing Risk in an AD Integrated Virtualized Environment [ Source: Dell Software ]

November 2014- The ubiquity of Active Directory (AD), the rapid adoption of virtualization and the tight integration between these technologies has given rise to today's modern AD virtualized infrastructure. Read this helpful report to explore the interdependent and combined security issues between AD and virtualization. Plus, learn how to identify and manage these risks.

NSS Labs Next-Gen Firewall Product Analysis Report [ Source: Dell Software ]

November 2014- Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.

Operationalizing the Network with SDN [ Source: F5 ]

November 2014- The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources-combined with increased mobility of apps migrating to the cloud and users across multiple devices. As an approach to operationalizing the network, SDN enables organizations to achieve greater economies of operational scale through the use of ...

Energy Companies and Financial Services Firms Vulnerable to Data-Breaching Malware [ Source: ThreatTrack Security ]

October 2014- Financial services firms and energy companies – two industries highly targeted by cybercriminals – must move quickly to address their cybersecurity deficiencies and shore up their defenses against advanced malware threats.

Prevent Data Breaches with Stronger Email Security [ Source: ThreatTrack Security ]

October 2014- Email remains the #1 threat vector for many organizations. To fight the onslaught of cyber threats, nothing short of a multilayered security architecture, backed by strict security policies and staff training, can protect an organization.

White Paper: Incident Response - How to Fight Back [ Source: Bit9 ]

October 2014- Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute's latest industry survey to understand these key findings.

eGuide to Advanced Threat Hunting [ Source: Bit9 ]

October 2014- With the number of advanced attacks increasing every day-most undiscovered through traditional detection and response solutions-truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Rapidly Respond to Advanced Attacks in Motion eGuide [ Source: Bit9 ]

October 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Organizations try to apply traditional incident response processes and procedures for each alert, but discover those procedures are insufficient for continuous application at an enterprise scale.

Extend Compliance And Risk Management To What Really Matters For Your Business [ Source: Absolute Software ]

September 2014- While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer ...

Next 25