Sort results by: Published date | Company name
Showing items 1-25

The Business Case for Mobile Security and Management Solutions [ Source: AT&T ]

March 2014- Organizations that have not developed an effective mobile empowerment and management strategy risk falling behind their more mobile-enabled competitors. Every organization today should have a viable mobile strategy that maximizes its market advantage while addressing the management and security challenges of a mobile-enabled workforce. An essential component of such a strategy is investing carefully in effective mobile management and security tools, as well as in the deployment model that brings the most benefit with the ...

Network protection and UTM Buyers Guide [ Source: Sophos ]

March 2014- Using a UTM solution for your network protection used to be a compromise - while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need.

Protecting Your Roaming Workforce With Cloud-Based Security [ Source: Sophos ]

March 2014- Remote and roaming workers are constantly checking email, downloading data, and staying productive. Results are their top priority-security is not. IT organizations need to keep up with these high-performers to update their security software and scan their systems for viruses without reducing their productivity.

So how can you empower remote and roaming employees with the tools they need, while still protecting your computing resources and proprietary data-without busting the budget or hiring an ...

Managing BitLocker with SafeGuard Enterprise [ Source: Sophos ]

March 2014- Full-disk encryption is rapidly becoming a standard security solution, like antivirus or spam filters-a trend further accelerated by widespread use of Microsoft BitLocker. However, to support the flexibility of your workers today, full-disk encryption is not enough to prevent data loss. Your users are no longer confined to the office by their technology and their PCs, and work has become a thing people do rather than a place they go to.

This whitepaper ...

Advanced Persistent Threats: Detection, Protection and Prevention [ Source: Sophos ]

March 2014- The threat landscape is changing, or is it?

Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years-social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones.

...

Two Great Ways to Protect Virtual Machines From Malware [ Source: Sophos ]

March 2014- Virtualization promises to reduce operational costs, simplify management and increase availability of servers and virtual desktops. But how do you protect virtual machines from malware without compromising the performance and convenience that you expect from your investment in virtualization?

This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments: agentless scanning using vShield Endpoint and client-based scanning optimized for virtual ...

Endpoint Buyers Guide [ Source: Sophos ]

March 2014- It takes more than antivirus to stop today's advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs.

Acheiving Trust After a Breach [ Source: Tripwire ]

March 2014- When an organization has been compromised, some of the first questions to ask are critical:

•Which systems can I trust?
• What was done to compromise my systems or data?
• How quickly can I figure out where I stand?

Tripwire is often called in after the fact to help answer these questions, even if the breached organization was not monitoring their systems with Tripwire technology. The following ...

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform [ Source: Tripwire ]

May 2012- Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized, and only providing value around audit time. How useful is a 100-page vulnerability report to an operations person trying to figure out what to fix next? But the tide is definitely turning?there is now a clear shift from a largely compliance-driven orientation to a more security-centric view. It?s widely acknowledged that compliance provides a low bar for security, and it just ...

Tripwire Vulnerability Scoring System [ Source: Tripwire ]

March 2014- Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by all levels of an organization. The challenge of how to measure, and therefore how to manage, risk is ever-present and top of mind for information security professionals. Unfortunately, most of the tools for vulnerability and risk management that exist today do not provide a suitable metric and consequently do not improve an ...

Buyer's Guide to Choosing a Vulnerability Management Solution [ Source: Tripwire ]

March 2014- Most organizations understand the critical role that vulnerability management (VM) plays in helping them meet compliance requirements,ensure security and reduce risk. However, many organizations discover,only after investing in a solution, that it doesn't properly address their needs. Avoiding this costly mistake can be difficult though, because at first glance many VM solutions appear similar.

This guide helps you objectively choose a new or replacement VM solution by teasing out the real ...

Lumension Guide To Patch Management Best Practices [ Source: Lumension ]

March 2014- With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities. Here are the Lumension-recommended steps to cure your patch management headache.

The 2014 Endpoint Security Buyer's Guide [ Source: Lumension ]

March 2014- Last year we offered our thoughts on buying Endpoint Security Management offerings - including patching, configuration, device control, and file integrity monitoring - which are increasingly bundled in suites to simplify management. In this updated and revised 2014 Endpoint Security Buyer's Guide we update our research on the management functions described last year and add coverage of antimalware, mobility, and BYOD. All very timely and relevant topics. The goal of this guide remains to provide clear ...

Financial Services Firm Chooses Egnyte over Box and Dropbox [ Source: Egnyte ]

March 2014- True North advisors wanted a file sharing solution which was simple and had enterprise grade security. After finding multiple security holes in Box and Dropbox they chose Egnyte as it provided superior security controls and deployment flexibility.

The Industrialization of Fraud [ Source: EMC ]

March 2014- Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence-driven techniques to redefine fraud risk.

You Are the Target - But You Don't Have To Be with Effective Authentication [ Source: EMC ]

March 2014- In its latest Executive Brief, security industry analyst Frost & Sullivan examines why any organization can be a target, and how robust authentication from leading global vendor RSA is a proven strategy for reducing your vulnerability. RSA's breadth of form factors - including Risk-Based Authentication - is just one aspect that sets RSA solutions apart. The insightful content focuses on: Why even secure passwords aren't enough, what makes an organization a target, four key areas that ...

Why Passwords Aren't Strong Enough - Making the Case for Strong Authentication [ Source: EMC ]

March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.

The Critical Incident Response Maturity Journey [ Source: EMC ]

March 2014- This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: EMC ]

March 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

Part 2 Whitepaper - Design & Choose the Right Solution : A Practical Guide Big Data Security Analytics [ Source: BAE Systems Applied Intelligence ]

March 2014- Design and Choose the Right Solution is number two in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. In chapter two we cover the importance of proper design and planning including business-driven strategies, requirements capture, and the risks in the market.

Before acquiring new technology to implement a Big Data cyber security analytics solution, we recommend that you do a thorough analysis of the ...

Part 1 Whitepaper - Why Use Big Data for Cyber Security? A Practical Guide Big Data Security Analytics [ Source: BAE Systems Applied Intelligence ]

March 2014- Why Use Big Data for Cyber Security is number one in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. In chapter one, we explore the value that big data analytics can bring to the cyber security problem. In chapter two we cover the importance of proper design and planning including business-driven strategies, requirements capture, and the risks in the market. Before acquiring new technology to implement ...

Threat Intelligence: Are you getting what you need? [ Source: BAE Systems Applied Intelligence ]

March 2014- Operationalizing your threat intelligence is vital to your business success. Malicious cyber criminals continue their relentless attack campaigns utilizing ever-changing techniques to compromise victims and wreak havoc in one form or another. Recent attacks are highly targeted and are designed to maximize the criminals' business goals.

The following questions are answered in this new whitepaper:

What is threat intelligence?
Who consumes threat intelligence?
How to apply threat intelligence?
...

Part 3 Whitepaper - How to Approach Implementation : A Practical Guide Big Data Security Analytics [ Source: BAE Systems Applied Intelligence ]

March 2014- How to approach implementation is number three in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. We are aware that application of Big Data is still new to cyber security analytics, and changes in both the Big Data and the security analytics markets are on the way. To support an early adopter approach, we have, in chapter one, described some implementation principles which have led to ...

Driving Competitive Advantage by Predicting the Future [ Source: Rogue Wave Software ]

February 2014- Competitive advantage is derived by an organization when it develops strategies, techniques, or resources that allow it to outperform its competition. One such resource is the innovative use of analytics to improve business decisions or operational processes. Decision makers can use analytics to cultivate the data collected from day-to-day operations into key insights unavailable to the competition.

The field of predictive analytics is the next evolution in business intelligence - moving beyond the ...

Protecting DNS Infrastructure-Inside and Out [ Source: Infoblox ]

February 2014- DNS has become a key part of enterprise networks and is used constantly to perform business-critical functions. Unfortunately, it has been largely overlooked in efforts to protect IT infrastructures and is increasingly targeted by hackers. A comprehensive solution is now available to protect against both types of attacks that exploit DNS-attacks from outside aimed at bringing the network down, and attempts by malware planted on internal servers to exfiltrate sensitive information. Read this white paper ...

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit [ Source: Infoblox ]

February 2014- Stories about devastating cyberattacks are plaguing the news every week. You might be thinking your network is secure. You have a sophisticated, layered, defense-in-depth strategy in place. Your customer data-and your business reputation-are undoubtedly secure, but is it? Take a look at yourself through the eyes of the cybercriminals who are making today's headlines. They know that there is a hole in most defenses and how to exploit it. Carrying out a DNS attack is ...

Next 25