Sort results by: Published date | Company name
Showing items 1-25

Promise Healthcare Case Study [ Source: Dell ]

December 2014- Promise Healthcare needed to improve security and achieve HIPAA compliance. They were in need of a solution that would deliver a deeper level of network protection and security services without compromising network performance. Promise Healthcare replaced its outdated firewalls with Dell SonicWALL NSA 6600 firewalls. The new firewalls provide robust security services that protect its patients, doctors, nurses and staff and comply with all HIPAA regulations. In addition, the implementation of Dell SonicWALL GMS has allowed ...

How to Achieve Intelligence-Driven Threat Detection and Response [ Source: RSA, The Security Division of EMC ]

November 2014- Learn the four key areas that organizations should focus on to achieve intelligence-driven threat detection and response.

Is Your Identity and Access Governance Program Vulnerable to Risk? [ Source: NetIQ ]

September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...

Enterprise Visibility, Auditing and Reporting for Windows [ Source: Dell Software ]

November 2014- Admins must achieve and prove IT compliance and security, support Active Directory (AD) migrations, and report on the configuration of AD, Windows file servers and SQL servers across their enterprise. Using a manual approach to tackle these challenges introduces the risk of security breaches and compliance failures. Discover how admins can easily identify and report on who has access to what files, folders and shares - and on what servers. Plus, learn about a scalable, ...

Managing Risk in an AD Integrated Virtualized Environment [ Source: Dell Software ]

November 2014- The ubiquity of Active Directory (AD), the rapid adoption of virtualization and the tight integration between these technologies has given rise to today's modern AD virtualized infrastructure. Read this helpful report to explore the interdependent and combined security issues between AD and virtualization. Plus, learn how to identify and manage these risks.

NSS Labs Next-Gen Firewall Product Analysis Report [ Source: Dell Software ]

November 2014- Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.

Privileged Access Users in the Enterprise [ Source: Gemalto ]

November 2014- How do you control access to your company's most sensitive data? Do your privileged users have unchecked accessibility?

Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Gain control over who accesses your company's sensitive data with Gemalto privileged user ...

Tablet Management Simplified [ Source: Dell/Microsoft ]

November 2014- Tablets first became popular as media devices for consumers and then began to invade workplaces with bring-your-own-device (BYOD) policies in place. Now, a growing number of businesses are not only supporting employee-owned tablets, they're also purchasing tablets, particularly Windows tablets, for employee use. Read now and learn how systems management and deployment appliances can make enterprise tablet support easier, reduce costs, enhance security, and free staff to concentrate on strategic projects.

Global Network Service Providers: Security a Position to Challenge the Botnet [ Source: Level 3 Communications ]

October 2014- A review of botnets, their evolution and methods of prevention. Download now to learn more!

Secure Cloud Networking [ Source: Level 3 Communications ]

October 2014- Secure cloud networking; learn how the biggest barrier to moving to the cloud - security - can be overcome by utilizing the right network connectivity and security bundles.

The Best Defense is a Good Offense: What Questions Should You Ask Your MSSP? [ Source: Level 3 Communications ]

October 2014- Finding the resources or the right managed security services provider (MSSP) to address the evolving cyber-security landscape can be challenging. Learn more.

Secure Data Services: A Connectivity Approach to Breaking Down the Enterprise IT Silo [ Source: Level 3 Communications ]

October 2014- The reality of today's enterprise IT environment is that change reigns supreme. With the right procurement strategy and network services provider, organizations can flex their connectivity requirements to suit. Learn how.

Level 3 SOC Threat Stats [ Source: Level 3 Communications ]

October 2014- See what the Level 3 Security Operations Center protects and monitors on a daily basis that puts them at the forefront of threat prevention and analysis.

No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers [ Source: ThreatTrack Security ]

October 2014- C-level executives regard the role of CISO primarily as a target for finger-pointing in the event of a data breach, and have little faith that individuals in the role could hold other leadership positions.

Leveraging Metadata for a Proactive Defense [ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]

October 2014- All too often network security professionals are forced into an escalating workflow-an arms race remediating alerts (indicators of attacks) as they come in, instead of proactively hunting for the adversary-who is likely already in your network. Resource and time constraints, as well as a lack of visibility and the right tools, lead to a best effort security posture (doing everything you can to stay above the rising tide of incoming attacks).

Access to ...

Comprehensive Advanced Threat Defense [ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]

October 2014- The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it is the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses.

We like to define advanced threat defense in terms of the adversary rather than the ...

Estimating the Cost of Insecure Mobile Devices in the Workplace [ Source: AT&T ]

October 2014- The study focuses on the risk created by employees' use of insecure mobile devices and what the potential financial exposure could be for companies.

5 Questions You Want and Need to Ask About MDM [ Source: AT&T ]

October 2014- This powerful guide gives you answers from industry-leading sources who asked organizations the questions you'd like, and need, to know.

Continuous Incident Response Solution Brief eGuide [ Source: Bit9 ]

October 2014- In a recent cross-industry study, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Fifty-seven percent said they needed to "find and investigate incidents as they are occurring." However, traditional incident response is tedious, time-consuming and imperfect.

White Paper: Incident Response - How to Fight Back [ Source: Bit9 ]

October 2014- Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute's latest industry survey to understand these key findings.

Rapidly Respond to Advanced Attacks in Motion eGuide [ Source: Bit9 ]

October 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Organizations try to apply traditional incident response processes and procedures for each alert, but discover those procedures are insufficient for continuous application at an enterprise scale.

Extend Compliance And Risk Management To What Really Matters For Your Business [ Source: Absolute Software ]

September 2014- While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer ...

Endpoint Security Trends [ Source: Absolute Software ]

September 2014- This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.

Self-encrypting Drives: You Don't Have to Sacrifice Performance for Security [ Source: SanDisk ]

September 2014- Complimentary white paper on high-performing, secure and affordable SanDisk SSDs.

Vendor Landscape: Endpoint Protection [ Source: Trend Micro ]

September 2014- Info-Tech Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry.
See how Trend Micro Smart Protection for Endpoints measured up against today’s requirements:

- Protection for data on the move
- Interfaces that are highly interactive
- Expanded platform integration
- Backed by a strong vendor

Securing Business Information in the Cloud [ Source: Box ]

November 2014- Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but adapting security controls and tools to a decentralized architecture has proven difficult. As a result, the modern enterprise is burdened with challenges like insecure devices ...

Next 25