Norman Malware Analyzer G2 Case Study: Red Sky Alliance
[ Source: Norman ]
August 2012-
Red Sky Alliance is a private subscription-based service where companies can openly share the latest malware and network security threats as well as assist each other with attack analysis, best practices, and threat prevention in a private environment. Please refer to the Red Sky Alliance Case Study to witness how the Norman Malware Analyzer G2 met the demanding expectations of Red Sky Alliance.
Protection Against Today's Modern Cyber Threats
[ Source: Bit9 ]
August 2012-
Are your endpoints safe from today's malware, data leaks and unauthorized software? With today's mobile workforce, businesses need to take every precaution to secure their endpoints.
Download this case study to learn how one accounting and consulting giant uses Bit9's advanced threat protection platform to offer employees flexibility without jeopardizing enterprise safety.
Are Your Domain Controllers At Risk?
[ Source: Bit9 ]
August 2012-
Did you know that enterprise servers were the victims of 94% of all data stolen last year. Servers have become strategic targets for cybercriminals intent on stealing business critical data and conducting protracted attacks.
Download this case study and learn how an international communications company locks down their domain controllers with Bit9's trust-based application control solution and are now protected against todays modern cyber threats.
Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
[ Source: FireEye ]
May 2011-
In this case study, Providence College deploys FireEye Web Malware Protection System 4000 Series appliance. It gave protection against advanced malware, zero-day and targeted APT attacks as well as immediate visibility into previously undetected malicious code and optimization of remediation processes permitted swift cost justification of project.
U.S. Navy Uses Novell Sentinel
[ Source: Novell ]
January 2010-
Maintaining the security of U.S. Navy networks is critical to the security of the country. Find out why Jim Granger, The U.S. Navy's director of capabilities and readiness, said Novell Sentinel helped "to secure and defend Navy networks worldwide against a persistent and adaptive threat."
Mammoth Hospital's Prescription For Preventing Insider Data Leaks
[ Source: DeviceLock ]
January 2010-
To prevent patient healthcare records from walking away on flash drives and other personal devices, this hospital has implemented a phased deployment of device/port access control. In the first phase, IT audits/shadows all download and upload activity at endpoint ports and drives. Observations about how employees are using their devices are key to setting effective device-related security policies. Next steps include allowing only sanctioned encrypted devices to access endpoint ports and drives. This ...
Case Study: eBay, Inc. - Securing the World's Online Marketplace
[ Source: Qualys ]
November 2009-
Learn how eBay was able to automate their network security auditing and get meaningful, actionable reports
IBM Banking: Integrated Fraud Strategy
[ Source: IBM ]
September 2009-
It is estimated that top-tier banks in the U.S. on average spend
$30 to $50 million more per year than necessary combating fraud across all channels. Learn how to combat sophisticated fraud threats while addressing your existing operational effectiveness across business lines to achieve a holistic enterprise view of risks.
IBM Banking: IBM And Norkom Lead In Information Security Solutions
[ Source: IBM ]
August 2009-
BM and Norkom, an IBM Business Partner, help global financial services firms adopt a comprehensive, integrated, risk-based approach to financial crime and compliance management. Adopting a strategy that encompasses not only IT, but also business processes and policies, is the key to meeting the financial crime challenge.
IBM Banking: Financial Crime Solutions
[ Source: IBM ]
October 2009-
Let IBM financial crime solutions help you detect patterns of fraudulent activity using real-time monitoring. These solutions help you adopt a proactive stance toward risk management.