Sort results by: Published date | Company name
Showing items 1-25

Why Passwords Aren't Strong Enough - Making the Case for Strong Authentication [ Source: EMC ]

March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.

KuppingerCole Leadership Compass: Identity Provisioning [ Source: Dell Software ]

February 2014- Identity Provisioning is still an important part of the Identity and Access Management market. That?s why the field is crowded with vendors claiming to have the solution your business needs. But which one is right for your company?

This Leadership Compass delivers an overview of those market segments. Learn more about established vendors, smaller or regional vendors with good growth potential, and which vendors your company should take a close look at ...

KuppingerCole Leadership Compass: Access Governance [ Source: Dell Software ]

February 2014- Access Governance is a fast-growing component in the Identity and Access Management market - so trusting a solution to manage it is crucial for the success of your business.

In this white paper, see why Dell One Identity Manager is identified as an Overall Leader in the KuppergerCole Leadership Compass: Access Governance report. You'll also get a detailed overview and analysis of the Access Governance market segement, and the solutions available in it.

IAM for the Real World: Identity Governance eBook [ Source: Dell Software ]

February 2014- Managing identity and access across the enterprise is difficult enough, and even simple provisioning can be tough. Factor in regulating compliance and navigating complex IT and user environments, and you?re looking at pretty sizable challenge.

In this eBook, discover best practices to solve your identity governance challenges. Topics include:

A comprehensive view of governance that covers not only application access, but also data and privileged accounts.

The key ...

Six Steps to Achieving Data Governance [ Source: Dell Software ]

February 2014- In this white paper, learn six easy steps to achieve data governance - quickly, easily and without the headaches. See how to control security threats and limit data access - across all your diverse platforms - while satisfying compliance requirements.

Delivering High-Assurance Payment Applications that are Compliant with the Point-to-Point Encryption Standard [ Source: SafeNet ]

October 2013- Payment Card Industry Point-to-Point Encryption (P2PE) standards provide detailed guidelines for building payment processing solutions that safeguard payment data at all times. In establishing the security mechanisms required to comply with P2PE, hardware security modules (HSMs) play a critical role. This paper presents service providers with detailed insights for finding an HSM that offers optimal support for their P2PE compliance and business objectives.

Manage Security and Risk Solution Guide [ Source: McAfee ]

September 2013- Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Securing Executives and Highly Sensitive Documents of Corporations Globally [ Source: Gemalto ]

September 2013- Every week brings new stories of companies damaged by the breach of sensitive information. For IT professionals up against the significant challenge of keeping corporate networks and information secure, top level executives and board members present unique requirements. These highly mobile individuals typically have access to the enterprise's most confidential information, from earnings outlooks to acquisition plans to new products, making them prime targets. It is evident that username and password authentication is simply not ...

Security Considerations for Online File Sharing [ Source: WatchDox ]

September 2013- The trend toward individuals and even departments subscribing to easily available cloud-based services, such as file sharing applications, without IT authority, is pushing many companies to deploy a corporate online file sharing and collaboration solution (OFS).

Download the "Security Considerations for Online File Sharing" white paper and learn what you need to look out for when considering an Online File Sharing Solution.

Topics include:

Advantages and disadvantages of different ...

Secure File Sharing and Collaboration [ Source: WatchDox ]

September 2013- The Path to Increased Productivity and Reduced Risk

Enterprise File Sharing and Sync (EFSS) products are making inroads into the enterprise -in fact, Forrester analyst Ted Schadler recently called the space the "hottest technology category since social networking". However, many EFSS implementations leave many issues unanswered, such as:

How will intellectual property be protected if a user shares or syncs it?
How will compliance be handled if regulated data ends ...

The 10 'Must-Haves' for Secure Enterprise Mobility [ Source: Citrix ]

August 2013- While enterprise mobility brings opportunity for your users and organization, it also invites risk. While mobile security concerns range from passcode enforcement to device encryption, data breach and data leakage are at the top of the list for implementers of mobile initiatives. This concern grows as an increasing number of smartphones and tablets not only connect to the corporate network but also access an increasing number of business applications and content repositories. Download this white ...

Top Ten Financial Industry Cybersecurity Myths Busted [ Source: Ciena ]

July 2013- In the financial industry, an organization's reputation and its ability to maintain the security of personal or payment information are crucial to customers. Do you continually identify and control risks to customer information and systems using policies and procedures that assess risks, control access, test for failures/breaches, oversee service providers, and periodically review, update, and report to both internal boards and external regulators? Are you aware of the myths that can put your clients ...

Switching Managed SSL Service Providers [ Source: GMO GlobalSign Ltd ]

May 2013- Switching to a new Certificate Authority for your SSL Certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. The key to success is setting expectations and preparing yourself and others for what's involved, in terms of resources and costs.

This white paper aims to help organisations make an educated choice about their enterprise SSL needs by outlining the key aspects to take into ...

3 Strategies To Protect Endpoints From Risky Applications [ Source: Dell ]

May 2013- Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment. That's because as the typical IT organization has worked on reducing the risk profile of PC and server operating systems, cyber criminals have started to look for greener pastures - namely among third-party applications. This white ...

Switching Managed SSL Service Providers [ Source: GMO GlobalSign Ltd ]

May 2013- Switching to a new Certificate Authority for your SSL certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. The key to success is setting expectations and preparing yourself and others for what's involved, in terms of resources and costs.

This white paper aims to help organizations make an educated choice about their enterprise SSL needs by structuring the main considerations to keep in ...

Gartner Magic Quadrant for Secure Email Gateways [ Source: McAfee ]

April 2013- Each year, leading research firm Gartner, Inc. conducts in-depth market research on the top email security providers. The resulting Magic Quadrant for Secure Email Gateways report is designed to help companies like yours understand which solutions have the best technology, strategic approach and vision to serve your security needs today and far into the future.

Email Encryption Made Simple [ Source: McAfee ]

April 2013- This paper discusses three common approaches to email encryption:
Organization-to-organization encryption, also known as "gateway-to-gateway"
Secure portal-based encryption, commonly referred to as organization-to-user "pull-based" encryption
Secure attachment, referred to as organization-to-user "push-based" encryption

All of these options are easy to implement and available using on-premises solutions or through Software-as-a-Service (SaaS). This paper provides an overview of these methods and explains their distinct advantages to help you determine which approach best ...

Securing Big Data: Recommendations for Hadoop and NoSQL Environments [ Source: Vormetric ]

March 2013- Big Data repositories enable enterprises to use large volumes of varied data to make more rapid decisions, but repositories frequently include sensitive data that must be secured. Most Hadoop and NoSQL environments that manipulate Big Data have little to no integrated security.

This technical paper provides an overview of NoSQL Big Data security issues and includes security recommendations that enterprises should consider when securing Big Data environments.

Securing and Controlling Data in the Cloud [ Source: Vormetric ]

March 2013- The Securing and Controlling Data in the Cloud white paper describes the various cloud formations (Private Cloud, Public Cloud, SaaS, PaaS, IaaS), the new security challenges posed by the cloud and solutions that enterprises can bring to bear for securing and controlling sensitive data in cloud environments.

Protecting Sensitive Data In and Around an IBM DB2 Database [ Source: Vormetric ]

March 2013- The Protecting Sensitive Data In and Around an IBM DB2 Database technical white paper provides an overview of the sensitive files in and around the IBM DB2 database that enterprises need to secure to achieve optimal database security.

Protecting Sensitive Data In and Around an Oracle Database [ Source: Vormetric ]

March 2013- The Protecting Sensitive Data In and Around an Oracle Database technical white paper provides an overview of the sensitive files in and around the Oracle database that enterprises need to secure in order to achieve optimal database security.

Protecting Sensitive Data In and Around a Microsoft SQL Server Database [ Source: Vormetric ]

March 2013- The Protecting Sensitive Data In and Around a SQL Server Database technical white paper provides an overview of the sensitive files in and around the Microsoft SQL Server database that enterprises need to secure in order to achieve optimal database security.

Three Steps to Mitigate Mobile Security Risks [ Source: Rapid7 ]

January 2013- Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices present to their corporate data.

This white paper highlights key mobile security risks and describes how pervasive they are based on data from ...

Reducing PCI DSS Scope: The Gateway Approach [ Source: Intel ]

October 2012- This White Paper discusses how you can generate tokens that replace credit card numbers with surrogates, removing systems from PCI DSS "Scope" -- which include any network components that are the primary focus of PCI DSS regulation, compliance and assessment.

Tokenization Buyer's Guide [ Source: Intel ]

October 2012- PCI DSS expert and QSA Walter Conway takes you on a deep dive tour of tokenization techniques and their merits. He also demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.

Clearing the Path to PCI DSS Version 2.0 Compliance [ Source: NetIQ ]

June 2012- As compliance demands comprehensive protection of cardholder data, enterprises require comprehensive solutions that support heterogeneous environments with a multitude of servers, operating systems, devices and applications. But getting to that point can be difficult without a good roadmap.

This whitepaper outlines a clear path to full PCI DSS compliance with a cost-effective solution.

Next 25