Sort results by: Published date | Company name
Showing items 1-25

Twelve Recommendations For Your Security Program In 2014 [ Source: TITUS ]

May 2014- Each year, Forrester Research outlines 12 important recommendations for security and risk management strategies for the coming year. These recommendations stem from Forrester's understanding of the current state of the industry, major upcoming shifts in the security technology landscape, and the anticipated business and technology changes that will affect organization around the world. In this report, learn how defining your data and giving it an identity are key to helping organizations better protect sensitive information.

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems [ Source: Dell Software ]

April 2014- Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common.

Intrusion prevention systems (IPS) are designed to prevent known attack traffic patterns from penetrating systems on the network. But there’s an inherent problem with the technology, since it can block only the attacks it sees and is already familiar with. If malicious code is cleverly disguised, it can slip ...

Guarding The Castle: The Strategies and Tools of Cybercriminals and How To Defeat Them [ Source: Dell Software ]

April 2014- Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. You need to understand your enemies before you can defeat them. This e-book will teach you why it is important that you know how you can secure your network every minute of the day against all types of malware, with a high performance firewall that protects against the latest global threats.

Find out ...

The Importance of Managing Privileged Accounts [ Source: Dell Software ]

April 2014- Privileged accounts are necessary, but carry implicit security risks, so securing them - while preserving access and ease of use - is vital. Especially with today's security and compliance concerns, effectively managing privileged accounts is more important than ever.

Protecting PoS Environments Against Multi-Stage Attacks [ Source: Symantec ]

March 2014- Securing your credit card data and PoS environment from attacks requires multiple layers of protection.

The Industrialization of Fraud [ Source: EMC ]

March 2014- Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence-driven techniques to redefine fraud risk.

You Are the Target - But You Don't Have To Be with Effective Authentication [ Source: EMC ]

March 2014- In its latest Executive Brief, security industry analyst Frost & Sullivan examines why any organization can be a target, and how robust authentication from leading global vendor RSA is a proven strategy for reducing your vulnerability. RSA's breadth of form factors - including Risk-Based Authentication - is just one aspect that sets RSA solutions apart. The insightful content focuses on: Why even secure passwords aren't enough, what makes an organization a target, four key areas that ...

Why Passwords Aren't Strong Enough - Making the Case for Strong Authentication [ Source: EMC ]

March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.

The Critical Incident Response Maturity Journey [ Source: EMC ]

March 2014- This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: EMC ]

March 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

Continuous Monitoring for Dummies [ Source: DLT / Symantec ]

March 2014- Welcome to Continuous Monitoring For Dummies, Symantec and DLT Solutions Special Edition. Today's IT systems have never been more vulnerable. Continuous monitoring is a must for the security of every agency's data and Information Technology (IT) infrastructure. This book discusses how agencies can reduce data and IT risks by implementing continuous monitoring, and increase the security of IT assets and infrastructures by using federal and industry best practices and solutions.

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks [ Source: Accellion ]

February 2014- The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and audit controls. Download this whitepaper to learn the benefits of adopting private cloud solution for file sharing and synchronization

Creating the ultimate security platform [ Source: IBM ]

February 2014- This white paper will examine the nature of attacks and vulnerabilities that create the shifting landscape of enterprise security, the capabilities that must be put into place to ensure secure operations, and the IBM hardware - and software - based solutions designed to meet those challenges. It is written for any organization that either has or is planning to add a mainframe in its computing environment and that is looking for insight into how to ...

Proactive data security, audit and compliance solutions [ Source: IBM ]

February 2014- This IBM competitive white paper discusses IBM solutions in three sections. First, we'll take a look at what our competition is saying about IBM when comparing our solution to theirs. Secondly, we'll look at the improvements brought with the newest release of InfoSphere Guardium that provide IBM with distinct product capabilities and advantages. Finally, we'll summarize the clear technical and business value when customers adopt a data activity monitoring solution from IBM.

Secure Mobile Access for Enterprise Employees [ Source: CA Technologies ]

January 2014- Mobile technology is revolutionizing the corporate IT landscape. Enterprises want to leverage mobile to maximize employee productivity, efficiency and availability. Meanwhile, employees are already taking the initiative by using their own personal mobile devices for business purposes. For enterprises, the benefits of enterprise mobility and the reality of the "bring-your-own-device" (BYOD) movement are becoming impossible to ignore.

Integrating File Transfer with Workload Automation: Six Characteristics of an Effective Solution [ Source: BMC Software ]

December 2013- In this paper, "Integrating File Transfer with Workload Automation: Six Characteristics of an Effective Solution," we examine the need to make standards-based file transfer a seamless part of workload automation.

Download "Integrating File Transfer with Workload Automation: Six Characteristics of an Effective Solution" today to find out what it takes to ensure accurate and timely businesses processes for your organization. Our list of six essential characteristics offers key guidance for your solution evaluation ...

IDC White Paper shares "How Security Improves Business Results" [ Source: Blue Coat ]

November 2013- IDC White Paper shares "How Security Improves Business Results". Learn why organizations should consider security technologies and infrastructures as enabling elements, not burdensome technology shackles and to think about what can be done from a security standpoint to mitigate risk as much as possible without stifling the underlying value of new technology.

2013 Gartner Critical Capabilities For SIEM [ Source: IBM ]

November 2013- IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases.

Gartner notes that SIEM technology is an important element of an organization's security strategy, because it establishes a consolidation point for all forms of security monitoring and can be ...

Securing Executives and Highly Sensitive Documents of Corporations Globally [ Source: Gemalto ]

September 2013- Every week brings new stories of companies damaged by the breach of sensitive information. For IT professionals up against the significant challenge of keeping corporate networks and information secure, top level executives and board members present unique requirements. These highly mobile individuals typically have access to the enterprise's most confidential information, from earnings outlooks to acquisition plans to new products, making them prime targets. It is evident that username and password authentication is simply not ...

New Generation Security for Advanced Threats [ Source: Bit9 ]

September 2013- Advanced Threats are Evading First Generation Security Solutions

Why have targeted Advanced Threats succeeded so dramatically when most organizations have architected sophisticated defense-in-depth strategies? Because most of the tools and strategies organizations possess were built for the last generation of security threats.

Download this free eBook and learn why:

ē First generation security solutions are far too silo-ed, signature based, and resource intensive to protect today's enterprises from second generation ...

12 Things IPS Systems Should Do [ Source: Dell Software ]

August 2013- Do you know what to look for in an intrusion protection system? Read our e-book, "12 Things Effective Intrusion Protection Systems Should Do." Don't leave your organization vulnerable to attacks. The attackers have extremely sophisticated evasion techniques to escape detection. Does your current IPS deliver an effective counter attack? Today's intrusion prevention systems provide advanced security intelligence and the ability to identify and block malware before it can enter your network. Learn how to detect and ...

10 Ways To Securely Optimize Your Network [ Source: Dell Software ]

August 2013- Web 2.0 and social networking applications have created an entirely new set of IT requirements for securing, controlling, and ensuring bandwidth in the new enterprise network. In this e-book, see how you can securely optimize your network with Dell SonicWALL's advanced security platform. It combines core next-generation firewall application intelligence, control and visualization, gateway protection and SSL inspection for enterprises, with WAN acceleration for distributed offices - elements that work seamlessly to maximize security and control. ...

Mitigating DDoS Attacks With F5 Technology [ Source: F5 ]

October 2013- Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and ...

How to Build a Massively Scalable Next-Generation Firewall [ Source: Dell Software ]

August 2013- Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. The paper discusses seven measures of scalability, and how to use them to evaluate NGFWs. The paper also outlines the kind of technical innovations needed to produce a massively scalable NGFW. You'll also see results from a benchmark test comparing the four leading next-generation firewalls. In the most demanding test in the series - scanning SSL traffic with firewall, anti-virus, ...

11 Cool Things Your Firewall Should Do [ Source: Dell Software ]

August 2013- Traditional firewalls are so yesterday. In this e-book, "11 Cool Things Your Firewall Should Do," you'll learn about the latest firewall technologies to conquer emerging threats. For example, with the proliferation of cloud computing and web 2.0 technologies, did you know that firewalls now have to contend with application control? The latest threats require the latest protection - like a high performance platform, deep packet inspection, intrusion prevention, and application intelligence, control and visualization. You'll get all ...

Embracing BYOD Through Secure App and Data Delivery [ Source: Citrix ]

August 2013- The proliferation of user-owned devices in the workplace is creating huge challenges for IT. As mobile device types, operating systems and apps proliferate, most IT organizations find that they're forced to lock down devices and impose limits on mobile apps to avoid rising security risks and management complexity. To meet this challenge, you need to go beyond traditional point solutions. Download this white paper to discover how you can secure and manage devices, apps and ...

Next 25