Sort results by: Published date | Company name

The State of DDoS Protection: Organizations Remain Unprepared for DDoS Attacks [ Source: Neustar ]
December 2012- Distributed denial-of-service (DDoS) attacks continue to grow in size, complexity and danger. Witness the recent wave of attacks on major U.S. banks, which knocked websites offline, angered customers and took a grave toll on brand reputations. The lessons of those attacks echo the findings of this report: Previously successful DDoS mitigation solutions no longer work.

UBM Tech conducted research with IT professionals who have suffered DDoS attacks. The drastic changes in attack ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Your Organization Has Just Been Attacked by Malware - Now What? [ Source: Sourcefire ]
December 2012- Jumping the gun? Maybe. But odds are it will happen.

Be ready with your Advanced Malware Survival Kit.

Download our Incident Response Brief: 4 keys to effective malware response From there, access:
• Videos: See the power of malware visibility and control from the network to end-devices
• Special Offer: 100 Free Seats of advanced malware protection

Download the Advanced Malware Survival Kit Now and be prepared before the next attack!

[WHITE PAPER]
Read Abstract | Go to White Paper

Three Steps to Mitigate Mobile Security Risks [ Source: Rapid7 ]
November 2012- Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices present to their corporate data.

This white paper highlights key mobile security risks and describes how pervasive they are based on data from ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance [ Source: Rapid7 ]
November 2012- The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance.

When you download this free eBook, ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Why You Need to Consider Privileged Access Management (And What You May Not Know About It That You Should) [ Source: Quest Software ]
November 2012- Access controls that define a specific set of user privileges are well accepted as a security best practice. Why, then, are these same principles so rarely applied to the most sensitive access of all: administrative accounts?

In this ENTERPRISE MANAGEMENT ASSOCIATES® report, you’ll discover common excuses given to justify this oversight. You’ll then see how modern privileged account management solutions provide the control and monitoring capabilities needed to bring privileged access ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Tolly Report: Anti-Virus Performance in VMWare ESX Virtual Environments [ Source: Symantec ]
October 2012- Symantec Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware ESXi 5 virtual environments vs. Trend Micro Deep Security 8. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning, and during distributed virus definition update

[WHITE PAPER]
Read Abstract | Go to White Paper

Dennis Technology Labs - Effectiveness in Virtual Environments [ Source: Symantec ]
October 2012- This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.

[WHITE PAPER]
Read Abstract | Go to White Paper

Cerberus: Malware Triage and Analysis [ Source: AccessData Group ]
October 2012- This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Cybersecurity in Action [ Source: Guidance Software ]
October 2012- 4 Days, 465 Systems, 3 continents

The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.

Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Achieving Compliance in Digital Investigations [ Source: Guidance Software ]
October 2012- 80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report

As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.

This ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All