Sort results by: Published date | Company name
Showing items 1-25

How Traditional Firewalls Fail [ Source: Dell ]

December 2014- Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help you counter today's threats, manage web 2.0 apps and enforce acceptable-use policies. If your company has a traditional firewall, it is probably jeopardizing your security and costing you money. Firewalls are an essential part of network security, but most are very limited. They can close unneeded ports, apply routing rules to packets ...

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: RSA, The Security Division of EMC ]

November 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

ESG Reviews the Processes and Technologies Required for Effective Incident Detection and Response Today [ Source: RSA, The Security Division of EMC ]

November 2014- Learn what CISOs can do to better protect their organizations from security breaches, and why a big data security analytics architecture is necessary for threat detection and response.

Master Mobile By Focusing on Productivity [ Source: Box ]

November 2014- View this infographic and learn how more enterprises are applying mobile to core processes, making customer support, sales operations, and everyday tasks more effective. By mastering mobility, IT teams play a key role in boosting productivity, efficiency, and ROI across the business.

Empowering Your Mobile Workers - 4 Criteria for Secure Collaboration [ Source: Box ]

November 2014- Download this whitepaper to learn how to build a mature mobile strategy and the top 4 criteria for secure collaboration. Today's most productive employees are not tied to a desk, an office, or a location. These top producers are experts at finding new tools, new apps, and new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with ...

Single Sign-On: with Passwords, Less is More [ Source: NetIQ ]

September 2014- Your workforce is using more applications from a wider variety of sources than ever. This causes security issues as users forget passwords, share them or write them down. Single sign-on (SSO) is a quick way to solve this problem. Now is the perfect time to implement SSO. This paper will explain SSO options and questions you should ask to determine the right solution for you. Security and productivity are both at stake: put SSO to ...

Mobile and Remote Access: Balancing Productivity and Security in a BYOD World [ Source: NetIQ ]

September 2014- In today's BYOD world, securing access and maintaining productivity is challenging; users want access from their own devices, and the applications, data and services they're accessing aren't inside the perimeter. But even in this environment, you can secure access. Read this paper to learn how you can implement access controls that keep up with the modern world. Get advice on how to take stock of your environment, leverage your current investments and keep your access ...

Is Your Identity and Access Governance Program Vulnerable to Risk? [ Source: NetIQ ]

September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...

Managing the Consumerization of IT [ Source: NetIQ ]

May 2014-

Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.


It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...

Managing Risk in an AD Integrated Virtualized Environment [ Source: Dell Software ]

November 2014- The ubiquity of Active Directory (AD), the rapid adoption of virtualization and the tight integration between these technologies has given rise to today's modern AD virtualized infrastructure. Read this helpful report to explore the interdependent and combined security issues between AD and virtualization. Plus, learn how to identify and manage these risks.

NSS Labs Next-Gen Firewall Product Analysis Report [ Source: Dell Software ]

November 2014- Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.

Operationalizing the Network with SDN [ Source: F5 ]

November 2014- The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources-combined with increased mobility of apps migrating to the cloud and users across multiple devices. As an approach to operationalizing the network, SDN enables organizations to achieve greater economies of operational scale through the use of ...

Energy Companies and Financial Services Firms Vulnerable to Data-Breaching Malware [ Source: ThreatTrack Security ]

October 2014- Financial services firms and energy companies – two industries highly targeted by cybercriminals – must move quickly to address their cybersecurity deficiencies and shore up their defenses against advanced malware threats.

Prevent Data Breaches with Stronger Email Security [ Source: ThreatTrack Security ]

October 2014- Email remains the #1 threat vector for many organizations. To fight the onslaught of cyber threats, nothing short of a multilayered security architecture, backed by strict security policies and staff training, can protect an organization.

White Paper: Incident Response - How to Fight Back [ Source: Bit9 ]

October 2014- Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute's latest industry survey to understand these key findings.

eGuide to Advanced Threat Hunting [ Source: Bit9 ]

October 2014- With the number of advanced attacks increasing every day-most undiscovered through traditional detection and response solutions-truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Rapidly Respond to Advanced Attacks in Motion eGuide [ Source: Bit9 ]

October 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Organizations try to apply traditional incident response processes and procedures for each alert, but discover those procedures are insufficient for continuous application at an enterprise scale.

Extend Compliance And Risk Management To What Really Matters For Your Business [ Source: Absolute Software ]

September 2014- While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer ...

Endpoint Security Trends [ Source: Absolute Software ]

September 2014- This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.

Self-encrypting Drives: You Don't Have to Sacrifice Performance for Security [ Source: SanDisk ]

September 2014- Complimentary white paper on high-performing, secure and affordable SanDisk SSDs.

Vendor Landscape: Endpoint Protection [ Source: Trend Micro ]

September 2014- Info-Tech Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry.
See how Trend Micro Smart Protection for Endpoints measured up against today’s requirements:

- Protection for data on the move
- Interfaces that are highly interactive
- Expanded platform integration
- Backed by a strong vendor

Securing Business Information in the Cloud [ Source: Box ]

November 2014- Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but adapting security controls and tools to a decentralized architecture has proven difficult. As a result, the modern enterprise is burdened with challenges like insecure devices ...

An Alternative to Today's Distributed Content Security Chaos [ Source: Box ]

September 2014- Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with status quo solutions won't work, so what will? ESG believes it's time for CIOs and CISOs to take a long look at centralized cloud-based content management services. New offerings provide enterprise ...

Privileged Identity Management [ Source: Gemalto ]

November 2014- Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.

Privileged users exist in every organization and they ...

Seven Steps to Creating an Effective Computer Security Incident Response Team [ Source: Absolute Software ]

September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.

BUILD A BUSINESS CASE: Intuitive and Innovative Approaches to Developing Custom Apps Quickly, Easily and Cost Effectively [ Source: ServiceNow ]

September 2014- Custom applications deliver significant value and they provide the opportunity to automate unstructured work processes to make the business far more innovative, efficient and competitive.

Next 25