Sort results by: Published date | Company name
Showing items 1-25

Windows XP End of Life Handbook for Upgrade Latecomers [ Source: Bit9 ]

April 2014- April 8, 2014, is the end-of-life date for Windows XP and Microsoft Office 2003. After that date, there will be NO MORE security updates and critical patches available unless you pay the high cost of out-of-band support. You considered upgrading to Windows 7 or Windows 8 but your hardware won't run these operating systems, or your XP applications won?t run on the newer operating systems, or you simply can?t afford to upgrade. If you do nothing, you know ...

The Convergence of Security and Compliance [ Source: Bit9 ]

April 2014- This white paper explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security-one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

IT security and compliance professionals must take proactive measures to prove continuous compliance with industry regulations or face steep noncompliance fees and/or damage to their company's ...

Server Security: A Reality Check [ Source: Bit9 ]

April 2014- Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This webcast will discuss the methodology of internal and external attacks on data center servers and the applications running on them. It will discuss why, even with our layers of security in place today, servers are ...

Advanced Endpoint and Server Protection [ Source: Bit9 ]

April 2014- Endpoint protection has become the punching bag of security. For every successful attack, the blame seems to point directly to a failure of endpoint protection. Not that this is totally unjustified - most solutions for endpoint protection have failed to keep pace with attackers.

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, ...

Simplifying Employee Investigations [ Source: SpectorSoft Corporation ]

March 2014- You just got news of yet another issue that just happened in your business that now you need to deal with - it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. ...

Insider Threat Survey Report [ Source: SpectorSoft Corporation ]

March 2014- Are you Catching the Signals

The insider threat is alive, thriving and often responsible for major data breaches that expose everything from consumer credit-card information to valuable intellectual property (IP), and the findings of our most recent survey support this assertion. The results from a pool of 419 enterprise-security respondents revealed that 23 percent of enterprises have experienced insider-driven data breaches.

Download this report and read more about 10 alarming Insider Threat trends.

Implementing an Employee Monitoring Program [ Source: SpectorSoft Corporation ]

March 2014- Security & Risk professionals recognize the value and benefits of implementing an employee-monitoring program. Privacy advocates and Legal and Human Resources professionals see potentially unwarranted invasion of employee privacy as reasons not to monitor, or at least to restrict monitoring to instances where enough "probable cause" exists to warrant tilting the balance between the privacy of an employee and the interests of the company.

In this whitepaper you will learn how to assist company ...

Acheiving Trust After a Breach [ Source: Tripwire ]

March 2014- When an organization has been compromised, some of the first questions to ask are critical:

•Which systems can I trust?
• What was done to compromise my systems or data?
• How quickly can I figure out where I stand?

Tripwire is often called in after the fact to help answer these questions, even if the breached organization was not monitoring their systems with Tripwire technology. The following ...

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform [ Source: Tripwire ]

May 2012- Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized, and only providing value around audit time. How useful is a 100-page vulnerability report to an operations person trying to figure out what to fix next? But the tide is definitely turning?there is now a clear shift from a largely compliance-driven orientation to a more security-centric view. It?s widely acknowledged that compliance provides a low bar for security, and it just ...

Tripwire Vulnerability Scoring System [ Source: Tripwire ]

March 2014- Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by all levels of an organization. The challenge of how to measure, and therefore how to manage, risk is ever-present and top of mind for information security professionals. Unfortunately, most of the tools for vulnerability and risk management that exist today do not provide a suitable metric and consequently do not improve an ...

Buyer's Guide to Choosing a Vulnerability Management Solution [ Source: Tripwire ]

March 2014- Most organizations understand the critical role that vulnerability management (VM) plays in helping them meet compliance requirements,ensure security and reduce risk. However, many organizations discover,only after investing in a solution, that it doesn't properly address their needs. Avoiding this costly mistake can be difficult though, because at first glance many VM solutions appear similar.

This guide helps you objectively choose a new or replacement VM solution by teasing out the real ...

Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment [ Source: Absolute Software ]

March 2014- Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security perspective.

Gartner Report: Containing Mobile Security Risks With the 80/20 Rule [ Source: Absolute Software ]

March 2014- IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or containment technologies. The Pareto principle "80/20" distribution provides a starting point.

Neustar SiteProtect | UltraDNS Solution: Double Your Protection [ Source: Neustar ]

March 2014- Learn how to protect against DNS DDoS attacks plus safeguard against cache poisoning with DNSSEC. UltraDNS manages and maintains its own industry leading resolver platform, as a non-open source platform, it isn't prone to hijacking, spoofing or viruses.

Ten Things Your Next Firewall Must Do [ Source: Palo Alto Networks ]

March 2014- Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges. Read this whitepaper to learn about the 10 things that ...

The Need for Speed: 2013 Incident Response Survey [ Source: FireEye ]

March 2014- From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate.

In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on:

The top security threats for global organizations in 2013;
The largest gaps in organization's ...

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks [ Source: FireEye ]

March 2014- If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD).

The white paper describes:

Taking a Lead-Forward Approach to Combat Today's Cyber Attacks [ Source: FireEye ]

March 2014- Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states.

This white paper highlights:

Why organizations need much more than fundamental security tools;
Strategies for dealing with advanced targeted attacks.

A New Security Approach for Today's Advanced Attacks [ Source: FireEye ]

March 2014- Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data.

This paper examines:

The limitations of existing security solutions;
Several security architectures, including sandbox-based products;
An architecture built from the ground up to truly protect against today's advanced attacks.

eBook: Achieve deeper network security and application control [ Source: Dell Software ]

March 2014- Learn about how your NGFW must be able to deliver a deeper level of network security to safeguard your organization from ever-evolving threats.

Making Smarter Mobile Security Decisions [ Source: Dell Software ]

March 2014- This paper examines mobile platform security vulnerabilities and discusses how to protect infrastructure from mobile security threats.

The FICAM Framework: Challenges and Guidance for Federal Identity, Credential and Access Management [ Source: Dell Software ]

March 2014- Dell solutions map to all components of the FICAM framework: credential, identity, and access management, federation, and auditing & reporting.

Privileged Accounts and Passwords: Risk Management in the Defense Community [ Source: Dell Software ]

March 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Getting Started With a Zero Trust Approach to Network Security [ Source: Palo Alto Networks ]

March 2014- The continued, high frequency of successful cyberattacks against today's enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. The failure of resulting architectures is a product not only of the outdated assumption that everything on the inside of an organization's network can be trusted, but also the inability of legacy countermeasures to provide adequate visibility, control, and protection of application traffic transiting associated network boundaries.

This paper ...

Part 2 Whitepaper - Design & Choose the Right Solution : A Practical Guide Big Data Security Analytics [ Source: BAE Systems Applied Intelligence ]

March 2014- Design and Choose the Right Solution is number two in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. In chapter two we cover the importance of proper design and planning including business-driven strategies, requirements capture, and the risks in the market.

Before acquiring new technology to implement a Big Data cyber security analytics solution, we recommend that you do a thorough analysis of the ...

Part 1 Whitepaper - Why Use Big Data for Cyber Security? A Practical Guide Big Data Security Analytics [ Source: BAE Systems Applied Intelligence ]

March 2014- Why Use Big Data for Cyber Security is number one in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. In chapter one, we explore the value that big data analytics can bring to the cyber security problem. In chapter two we cover the importance of proper design and planning including business-driven strategies, requirements capture, and the risks in the market. Before acquiring new technology to implement ...

Next 25