Sort results by: Published date | Company name
Showing items 1-25

What to Look For When Evaluating NGFW [ Source: Dell ]

December 2014- It is never easy to evaluate and compare complex technology products. Vendors provide feature lists and documentation, but feature lists never tell the whole story. Testing products in your own environment is costly and time consuming. In this paper, we summarize the results of three independent tests that can help you select a next-generation firewall for your organization. We also provide links to the portions of the research that have been made public, so you ...

Managing the Consumerization of IT [ Source: NetIQ ]

May 2014-

Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.


It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...

Advanced Persistent Threats: Hijacking Insider Credentials [ Source: NetIQ ]

May 2014-

Sophisticated groups of hackers, known as advanced persistent threats (APTs), often use stolen insider credentials to evade security measures. So how can you know who's logging on? Learn how to spot suspicious activity before it's too late.


Individual hackers are no longer the foremost threat. APTs have evolved. These malicious actors now use sophisticated tactics to circumvent security policies. Whether people are trying to use spear-phishing scams or other means to ...

2014 Cost of Cyber Crime study: Global [ Source: HP ]

October 2014- Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continue to rise. But there is good news, too. Security defenses and a strong security posture help drive down the losses.

Separate reports exist for each country, and this ...

2014 Cost of Cyber Crime study: United States [ Source: HP ]

October 2014- For the fifth year running, the United States led the world in number and cost of cyber attacks. The Ponemon Institute surveyed 59 U.S. companies, performing 544 individual interviews to assess their experience with cyber crime. The mean annualized cost for the U.S. companies surveyed was $12.7 million—up 9.3 percent from last year. There is good news, though. A strong security posture and deployment of security intelligence systems drives down the cost for many companies. ...

Self-encrypting Drives: You Don't Have to Sacrifice Performance for Security [ Source: SanDisk ]

September 2014- Complimentary white paper on high-performing, secure and affordable SanDisk SSDs.

Guide to Data Security [ Source: DLT / Symantec ]

September 2014- Protecting the government's data is an all-consuming, top priority. As the federal government's data growth continues to spiral, and as the types of data threats and leakage change, data and storage managers have no choice but to be on the front lines of protecting their agencies' data. That means first building a solid data storage and management foundation – one that ensures that all data is accounted for at all times and that it's continually backed ...

Blue Coat's Encrypted Traffic Management Interactive E-Guide [ Source: Blue Coat ]

September 2014- According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.

What you will learn:

• How Encrypted traffic is growing exponentially and how it ...

2014 Ponemon Cost of Data Breach Study [ Source: IBM ]

August 2014- The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States.

IBM Security Services 2014 Cyber Security Intelligence Index [ Source: IBM ]

August 2014- When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business-across every industry-is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events that occurred at a sample of 1,000 IBM clients in 133 countries. The paper details the volume of attacks that occurred in the 2013 calendar year; the financial impact that ...

Information Security Buyer's Guide [ Source: AccessData ]

August 2014- This Buyer's Guide will aid organizations in specifying information security solutions for rapid detection and resolution. The need for these solutions has never been greater as organizations struggle to fight a deluge of sophisticated cyber threats and breaches. Many go undetected until it's too late to do much more than conduct triage, assess the damage and initiate massive shareholder and public damage control. This situation puts board members, c-suite executives and security experts in the ...

Privileged Accounts and Passwords: Risk Management in Civilian Agencies [ Source: Dell Software ]

June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Twelve Recommendations For Your Security Program In 2014 [ Source: TITUS ]

May 2014- Each year, Forrester Research outlines 12 important recommendations for security and risk management strategies for the coming year. These recommendations stem from Forrester's understanding of the current state of the industry, major upcoming shifts in the security technology landscape, and the anticipated business and technology changes that will affect organization around the world. In this report, learn how defining your data and giving it an identity are key to helping organizations better protect sensitive information.

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems [ Source: Dell Software ]

April 2014- Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common.

Intrusion prevention systems (IPS) are designed to prevent known attack traffic patterns from penetrating systems on the network. But there’s an inherent problem with the technology, since it can block only the attacks it sees and is already familiar with. If malicious code is cleverly disguised, it can slip ...

Guarding The Castle: The Strategies and Tools of Cybercriminals and How To Defeat Them [ Source: Dell Software ]

April 2014- Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. You need to understand your enemies before you can defeat them. This e-book will teach you why it is important that you know how you can secure your network every minute of the day against all types of malware, with a high performance firewall that protects against the latest global threats.

Find out ...

The Importance of Managing Privileged Accounts [ Source: Dell Software ]

April 2014- Privileged accounts are necessary, but carry implicit security risks, so securing them - while preserving access and ease of use - is vital. Especially with today's security and compliance concerns, effectively managing privileged accounts is more important than ever.

Protecting PoS Environments Against Multi-Stage Attacks [ Source: Symantec ]

March 2014- Securing your credit card data and PoS environment from attacks requires multiple layers of protection.

The Industrialization of Fraud [ Source: EMC ]

March 2014- Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence-driven techniques to redefine fraud risk.

You Are the Target - But You Don't Have To Be with Effective Authentication [ Source: EMC ]

March 2014- In its latest Executive Brief, security industry analyst Frost & Sullivan examines why any organization can be a target, and how robust authentication from leading global vendor RSA is a proven strategy for reducing your vulnerability. RSA's breadth of form factors - including Risk-Based Authentication - is just one aspect that sets RSA solutions apart. The insightful content focuses on: Why even secure passwords aren't enough, what makes an organization a target, four key areas that ...

Why Passwords Aren't Strong Enough - Making the Case for Strong Authentication [ Source: EMC ]

March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.

The Critical Incident Response Maturity Journey [ Source: EMC ]

March 2014- This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: EMC ]

March 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

Continuous Monitoring for Dummies [ Source: DLT / Symantec ]

March 2014- Welcome to Continuous Monitoring For Dummies, Symantec and DLT Solutions Special Edition. Today's IT systems have never been more vulnerable. Continuous monitoring is a must for the security of every agency's data and Information Technology (IT) infrastructure. This book discusses how agencies can reduce data and IT risks by implementing continuous monitoring, and increase the security of IT assets and infrastructures by using federal and industry best practices and solutions.

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks [ Source: Accellion ]

February 2014- The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and audit controls. Download this whitepaper to learn the benefits of adopting private cloud solution for file sharing and synchronization

Creating the ultimate security platform [ Source: IBM ]

February 2014- This white paper will examine the nature of attacks and vulnerabilities that create the shifting landscape of enterprise security, the capabilities that must be put into place to ensure secure operations, and the IBM hardware - and software - based solutions designed to meet those challenges. It is written for any organization that either has or is planning to add a mainframe in its computing environment and that is looking for insight into how to ...

Proactive data security, audit and compliance solutions [ Source: IBM ]

February 2014- This IBM competitive white paper discusses IBM solutions in three sections. First, we'll take a look at what our competition is saying about IBM when comparing our solution to theirs. Secondly, we'll look at the improvements brought with the newest release of InfoSphere Guardium that provide IBM with distinct product capabilities and advantages. Finally, we'll summarize the clear technical and business value when customers adopt a data activity monitoring solution from IBM.

Next 25