Sort results by: Published date | Company name
Showing items 1-25

Mobile and Remote Access: Balancing Productivity and Security in a BYOD World [ Source: NetIQ ]

September 2014- In today's BYOD world, securing access and maintaining productivity is challenging; users want access from their own devices, and the applications, data and services they're accessing aren't inside the perimeter. But even in this environment, you can secure access. Read this paper to learn how you can implement access controls that keep up with the modern world. Get advice on how to take stock of your environment, leverage your current investments and keep your access ...

Is Your Identity and Access Governance Program Vulnerable to Risk? [ Source: NetIQ ]

September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...

Managing the Consumerization of IT [ Source: NetIQ ]

May 2014-

Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.


It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...

Advanced Persistent Threats: Hijacking Insider Credentials [ Source: NetIQ ]

May 2014-

Sophisticated groups of hackers, known as advanced persistent threats (APTs), often use stolen credentials evade security measures. So how can you know who's logging on? Learn how to spot suspicious activity before it's too late.


Individual hackers are no longer the foremost threat. APTs have evolved. These malicious actors now use sophisticated tactics to circumvent security policies. Whether people are trying to use spear-phishing scams or other means to try and ...

NSS Labs Next-Gen Firewall Product Analysis Report [ Source: Dell Software ]

November 2014- Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.

Security Evolves and Criminals Follow [ Source: Authentify ]

May 2014- This paper discusses the role of out-of-band authentication in battling e-crime.

The future of user-based security risks [ Source: ObserveIT ]

September 2014- IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches--user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.

KuppingerCole Leadership Compass: Identity Provisioning [ Source: Dell Software ]

May 2014- Identity Provisioning is still an important part of the Identity and Access Management market. That's why the field is crowded with vendors claiming to have the solution your business needs. But which one is right for your company?

This Leadership Compass delivers an overview of those market segments. Learn more about established vendors, smaller or regional vendors with good growth potential, and which vendors your company should take a close look at when ...

KuppingerCole Leadership Compass: Access Governance [ Source: Dell Software ]

May 2014- Access Governance is a fast-growing component in the Identity and Access Management market - so trusting a solution to manage it is crucial for the success of your business.

In this white paper, see why Dell One Identity Manager is identified as an Overall Leader in the KuppergerCole Leadership Compass: Access Governance report. You'll also get a detailed overview and analysis of the Access Governance market segement, and the solutions available in it.

IAM for the Real World: Identity Governance eBook [ Source: Dell Software ]

May 2014- Managing identity and access across the enterprise is difficult enough, and even simple provisioning can be tough. Factor in regulating compliance and navigating complex IT and user environments, and you?re looking at pretty sizable challenge.

In this eBook, discover best practices to solve your identity governance challenges. Topics include:

• A comprehensive view of governance that covers not only application access, but also data and privileged accounts.

• The key ...

Six Steps to Achieving Data Governance [ Source: Dell Software ]

May 2014- In this white paper, learn six easy steps to achieve data governance - quickly, easily and without the headaches. See how to control security threats and limit data access - across all your diverse platforms - while satisfying compliance requirements.

The Industrialization of Fraud [ Source: EMC ]

March 2014- Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence-driven techniques to redefine fraud risk.

Why Passwords Aren't Strong Enough - Making the Case for Strong Authentication [ Source: EMC ]

March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.

Delivering High-Assurance Payment Applications that are Compliant with the Point-to-Point Encryption Standard [ Source: SafeNet ]

October 2013- Payment Card Industry Point-to-Point Encryption (P2PE) standards provide detailed guidelines for building payment processing solutions that safeguard payment data at all times. In establishing the security mechanisms required to comply with P2PE, hardware security modules (HSMs) play a critical role. This paper presents service providers with detailed insights for finding an HSM that offers optimal support for their P2PE compliance and business objectives.

Manage Security and Risk Solution Guide [ Source: McAfee ]

September 2013- Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Securing Executives and Highly Sensitive Documents of Corporations Globally [ Source: Gemalto ]

September 2013- Every week brings new stories of companies damaged by the breach of sensitive information. For IT professionals up against the significant challenge of keeping corporate networks and information secure, top level executives and board members present unique requirements. These highly mobile individuals typically have access to the enterprise's most confidential information, from earnings outlooks to acquisition plans to new products, making them prime targets. It is evident that username and password authentication is simply not ...

Security Considerations for Online File Sharing [ Source: WatchDox ]

September 2013- The trend toward individuals and even departments subscribing to easily available cloud-based services, such as file sharing applications, without IT authority, is pushing many companies to deploy a corporate online file sharing and collaboration solution (OFS).

Download the "Security Considerations for Online File Sharing" white paper and learn what you need to look out for when considering an Online File Sharing Solution.

Topics include:

Advantages and disadvantages of different ...

Secure File Sharing and Collaboration [ Source: WatchDox ]

September 2013- The Path to Increased Productivity and Reduced Risk

Enterprise File Sharing and Sync (EFSS) products are making inroads into the enterprise -in fact, Forrester analyst Ted Schadler recently called the space the "hottest technology category since social networking". However, many EFSS implementations leave many issues unanswered, such as:

How will intellectual property be protected if a user shares or syncs it?
How will compliance be handled if regulated data ends ...

The 10 'Must-Haves' for Secure Enterprise Mobility [ Source: Citrix ]

August 2013- While enterprise mobility brings opportunity for your users and organization, it also invites risk. While mobile security concerns range from passcode enforcement to device encryption, data breach and data leakage are at the top of the list for implementers of mobile initiatives. This concern grows as an increasing number of smartphones and tablets not only connect to the corporate network but also access an increasing number of business applications and content repositories. Download this white ...

Top Ten Financial Industry Cybersecurity Myths Busted [ Source: Ciena ]

July 2013- In the financial industry, an organization's reputation and its ability to maintain the security of personal or payment information are crucial to customers. Do you continually identify and control risks to customer information and systems using policies and procedures that assess risks, control access, test for failures/breaches, oversee service providers, and periodically review, update, and report to both internal boards and external regulators? Are you aware of the myths that can put your clients ...

Switching Managed SSL Service Providers [ Source: GMO GlobalSign Ltd ]

May 2013- Switching to a new Certificate Authority for your SSL Certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. The key to success is setting expectations and preparing yourself and others for what's involved, in terms of resources and costs.

This white paper aims to help organisations make an educated choice about their enterprise SSL needs by outlining the key aspects to take into ...

3 Strategies To Protect Endpoints From Risky Applications [ Source: Dell ]

May 2013- Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment. That's because as the typical IT organization has worked on reducing the risk profile of PC and server operating systems, cyber criminals have started to look for greener pastures - namely among third-party applications. This white ...

Switching Managed SSL Service Providers [ Source: GMO GlobalSign Ltd ]

May 2013- Switching to a new Certificate Authority for your SSL certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. The key to success is setting expectations and preparing yourself and others for what's involved, in terms of resources and costs.

This white paper aims to help organizations make an educated choice about their enterprise SSL needs by structuring the main considerations to keep in ...

Gartner Magic Quadrant for Secure Email Gateways [ Source: McAfee ]

April 2013- Each year, leading research firm Gartner, Inc. conducts in-depth market research on the top email security providers. The resulting Magic Quadrant for Secure Email Gateways report is designed to help companies like yours understand which solutions have the best technology, strategic approach and vision to serve your security needs today and far into the future.

Email Encryption Made Simple [ Source: McAfee ]

April 2013- This paper discusses three common approaches to email encryption:
Organization-to-organization encryption, also known as "gateway-to-gateway"
Secure portal-based encryption, commonly referred to as organization-to-user "pull-based" encryption
Secure attachment, referred to as organization-to-user "push-based" encryption

All of these options are easy to implement and available using on-premises solutions or through Software-as-a-Service (SaaS). This paper provides an overview of these methods and explains their distinct advantages to help you determine which approach best ...

Securing Big Data: Recommendations for Hadoop and NoSQL Environments [ Source: Vormetric ]

March 2013- Big Data repositories enable enterprises to use large volumes of varied data to make more rapid decisions, but repositories frequently include sensitive data that must be secured. Most Hadoop and NoSQL environments that manipulate Big Data have little to no integrated security.

This technical paper provides an overview of NoSQL Big Data security issues and includes security recommendations that enterprises should consider when securing Big Data environments.

Next 25