Sort results by: Published date | Company name
Showing items 1-25

You Are the Target - But You Don't Have To Be with Effective Authentication [ Source: EMC ]

March 2014- In its latest Executive Brief, security industry analyst Frost & Sullivan examines why any organization can be a target, and how robust authentication from leading global vendor RSA is a proven strategy for reducing your vulnerability. RSA's breadth of form factors - including Risk-Based Authentication - is just one aspect that sets RSA solutions apart. The insightful content focuses on: Why even secure passwords aren't enough, what makes an organization a target, four key areas that ...

Why Passwords Aren't Strong Enough - Making the Case for Strong Authentication [ Source: EMC ]

March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.

The Critical Incident Response Maturity Journey [ Source: EMC ]

March 2014- This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.

Signature-less Malware Detection: Finding an Evil in the Haystack [ Source: EMC ]

March 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.

Continuous Monitoring for Dummies [ Source: DLT / Symantec ]

March 2014- Welcome to Continuous Monitoring For Dummies, Symantec and DLT Solutions Special Edition. Today's IT systems have never been more vulnerable. Continuous monitoring is a must for the security of every agency's data and Information Technology (IT) infrastructure. This book discusses how agencies can reduce data and IT risks by implementing continuous monitoring, and increase the security of IT assets and infrastructures by using federal and industry best practices and solutions.

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks [ Source: Accellion ]

February 2014- The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and audit controls. Download this whitepaper to learn the benefits of adopting private cloud solution for file sharing and synchronization

The Importance of Managing Privileged Accounts [ Source: Dell Software ]

February 2014- In this Windows IT Pro white paper sponsored by Dell, discover the dangers and benefits of privileged accounts - and how to mitigate risks by enabling granular access control and accountability for them.

Creating the ultimate security platform [ Source: IBM ]

February 2014- This white paper will examine the nature of attacks and vulnerabilities that create the shifting landscape of enterprise security, the capabilities that must be put into place to ensure secure operations, and the IBM hardware - and software - based solutions designed to meet those challenges. It is written for any organization that either has or is planning to add a mainframe in its computing environment and that is looking for insight into how to ...

Proactive data security, audit and compliance solutions [ Source: IBM ]

February 2014- This IBM competitive white paper discusses IBM solutions in three sections. First, we'll take a look at what our competition is saying about IBM when comparing our solution to theirs. Secondly, we'll look at the improvements brought with the newest release of InfoSphere Guardium that provide IBM with distinct product capabilities and advantages. Finally, we'll summarize the clear technical and business value when customers adopt a data activity monitoring solution from IBM.

Secure Mobile Access for Enterprise Employees [ Source: CA Technologies ]

January 2014- Mobile technology is revolutionizing the corporate IT landscape. Enterprises want to leverage mobile to maximize employee productivity, efficiency and availability. Meanwhile, employees are already taking the initiative by using their own personal mobile devices for business purposes. For enterprises, the benefits of enterprise mobility and the reality of the "bring-your-own-device" (BYOD) movement are becoming impossible to ignore.

Integrating File Transfer with Workload Automation: Six Characteristics of an Effective Solution [ Source: BMC Software ]

December 2013- In this paper, "Integrating File Transfer with Workload Automation: Six Characteristics of an Effective Solution," we examine the need to make standards-based file transfer a seamless part of workload automation.

Download "Integrating File Transfer with Workload Automation: Six Characteristics of an Effective Solution" today to find out what it takes to ensure accurate and timely businesses processes for your organization. Our list of six essential characteristics offers key guidance for your solution evaluation ...

IDC White Paper shares "How Security Improves Business Results" [ Source: Blue Coat ]

November 2013- IDC White Paper shares "How Security Improves Business Results". Learn why organizations should consider security technologies and infrastructures as enabling elements, not burdensome technology shackles and to think about what can be done from a security standpoint to mitigate risk as much as possible without stifling the underlying value of new technology.

2013 Gartner Critical Capabilities For SIEM [ Source: IBM ]

November 2013- IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases.

Gartner notes that SIEM technology is an important element of an organization's security strategy, because it establishes a consolidation point for all forms of security monitoring and can be ...

Securing Executives and Highly Sensitive Documents of Corporations Globally [ Source: Gemalto ]

September 2013- Every week brings new stories of companies damaged by the breach of sensitive information. For IT professionals up against the significant challenge of keeping corporate networks and information secure, top level executives and board members present unique requirements. These highly mobile individuals typically have access to the enterprise's most confidential information, from earnings outlooks to acquisition plans to new products, making them prime targets. It is evident that username and password authentication is simply not ...

New Generation Security for Advanced Threats [ Source: Bit9 ]

September 2013- Advanced Threats are Evading First Generation Security Solutions

Why have targeted Advanced Threats succeeded so dramatically when most organizations have architected sophisticated defense-in-depth strategies? Because most of the tools and strategies organizations possess were built for the last generation of security threats.

Download this free eBook and learn why:

First generation security solutions are far too silo-ed, signature based, and resource intensive to protect today's enterprises from second generation ...

12 Things IPS Systems Should Do [ Source: Dell Software ]

August 2013- Do you know what to look for in an intrusion protection system? Read our e-book, "12 Things Effective Intrusion Protection Systems Should Do." Don't leave your organization vulnerable to attacks. The attackers have extremely sophisticated evasion techniques to escape detection. Does your current IPS deliver an effective counter attack? Today's intrusion prevention systems provide advanced security intelligence and the ability to identify and block malware before it can enter your network. Learn how to detect and ...

10 Ways To Securely Optimize Your Network [ Source: Dell Software ]

August 2013- Web 2.0 and social networking applications have created an entirely new set of IT requirements for securing, controlling, and ensuring bandwidth in the new enterprise network. In this e-book, see how you can securely optimize your network with Dell SonicWALL's advanced security platform. It combines core next-generation firewall application intelligence, control and visualization, gateway protection and SSL inspection for enterprises, with WAN acceleration for distributed offices - elements that work seamlessly to maximize security and control. ...

Mitigating DDoS Attacks With F5 Technology [ Source: F5 ]

October 2013- Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and ...

How to Build a Massively Scalable Next-Generation Firewall [ Source: Dell Software ]

August 2013- Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. The paper discusses seven measures of scalability, and how to use them to evaluate NGFWs. The paper also outlines the kind of technical innovations needed to produce a massively scalable NGFW. You'll also see results from a benchmark test comparing the four leading next-generation firewalls. In the most demanding test in the series - scanning SSL traffic with firewall, anti-virus, ...

11 Cool Things Your Firewall Should Do [ Source: Dell Software ]

August 2013- Traditional firewalls are so yesterday. In this e-book, "11 Cool Things Your Firewall Should Do," you'll learn about the latest firewall technologies to conquer emerging threats. For example, with the proliferation of cloud computing and web 2.0 technologies, did you know that firewalls now have to contend with application control? The latest threats require the latest protection - like a high performance platform, deep packet inspection, intrusion prevention, and application intelligence, control and visualization. You'll get all ...

Embracing BYOD Through Secure App and Data Delivery [ Source: Citrix ]

August 2013- The proliferation of user-owned devices in the workplace is creating huge challenges for IT. As mobile device types, operating systems and apps proliferate, most IT organizations find that they're forced to lock down devices and impose limits on mobile apps to avoid rising security risks and management complexity. To meet this challenge, you need to go beyond traditional point solutions. Download this white paper to discover how you can secure and manage devices, apps and ...

Securing Android, iOS and Windows Tablets and Smartphones [ Source: Citrix ]

August 2013- Android, iOS and Windows-based mobile devices - including tablets, smartphones and everything in between-play an expanding role in enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. This white paper describes these issues and explains how they can be addressed effectively with solutions from Citrix. Download the white paper for your guide to securing mobile devices

Secure Mobile Email Deployment Guide [ Source: Citrix ]

August 2013- Smartphones and tablets entering the workplace bring unprecedented opportunity to boost productivity. But there is also risk associated with their use. Their cost, portability and exclusive WiFi connectivity leaves them particularly vulnerable to theft, data leakage, and WiFi snooping. Apps are a particular point of concern. Several options, each with varying levels of security and convenience, are available to IT departments to secure access to email and associated information. This guide discusses several types of ...

Reducing Risk through Prevention: Implementing SANS Critical Security Controls 1-4 [ Source: Tripwire, Inc ]

July 2013- The trend line for cybersecurity crimes continues to increase, with no signs of a meaningful decrease on the horizon. Is there anything an organization can do to stop these attacks from occurring and protect their critical information systems from intruders? Business leaders need to understand the risks that face their organization if they are to effectively mitigate them.

In this SANS Analyst Program whitepaper, we will discuss 1) the actual threats facing organizations today ...

Five Challenges To Continuous PCI DSS Compliance [ Source: Tripwire, Inc ]

July 2013- With adoption of the PCI DSS expanding out the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.

Protect Your Enterprise Data Through Privileged Identity Management [ Source: CA, Inc. ]

July 2013- Controlling access to privileged accounts by controlling only the password does not limit what malicious users can do once they access a privileged account. This applies both to insider threats as well as external, Advanced Persistent Threats or phishing schemes to reveal key passwords.

Discover how privileged identity management tools can help you:

Mitigate risk and increase data integrity by securing privileged user passwords
Track actions of all individuals, even ...

Next 25