Sort results by: Published date | Company name
Showing items 1-25

White Book : Cloud Security - The Definitive Guide to Managing Risk in the New ICT Landscape [ Source: Fujitsu America Inc. ]

June 2014- Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organizations, the journey to cloud is no longer question of "if" but rather "when", and a large number of enterprises have already travelled some way down this path.

However, there is one overwhelming question that is still causing many CIOs and their colleagues to delay their move to cloud: Is cloud computing secure? As many unwary businesses have ...

Privileged Accounts and Passwords: Risk Management in Civilian Agencies [ Source: Dell Software ]

June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Connected Security for FICAM and SICAM with Dell One Identity Solutions [ Source: Dell Software ]

June 2014- Dell solutions map to all areas of the FICAM and SICAM frameworks: Credential, identity, and access mgmt, federation, and auditing & reporting.

HawkEye G: The Active Defense Grid [ Source: Hexis Cyber ]

May 2014- HawkEye G is a dynamic active defense system designed to leverage existing security assets while providing advanced cyber security analytics and automated countermeasure techniques. The combination of the traditional signature-based and new behavior-based heuristics leads to heightened awareness of standard network activity and deviations that could indicate a potentially disastrous situation. Understanding the full threat and defense landscape is crucial for cyber security mitigation and the HawkEye G team has invested the time and resources ...

Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

April 2014- For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar’s survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Larger attacks are more common, but most attacks are still less than 1 Gbps. More than half of attacked companies reported theft of funds, data or intellectual property. Read the full report to learn how ...

Managing security risks and vulnerabilities [ Source: IBM ]

April 2014- With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Defending against increasingly sophisticated DDoS attacks [ Source: IBM ]

April 2014- This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

IDC: Optimizing Storage With All-Flash Solutions : Analyst Report [ Source: Hitachi ]

February 2014- See how to take advantage of advancements in semiconductor technology and the popularity of NAND flash that have made NAND flash-based SSDs into a cost-effective solution for the enterprise. Find higher performance and improved responsiveness while mitigating the inefficiencies of existing hard disk drive (HDD) technology.

Advanced Evasion Techniques for Dummies [ Source: McAfee ]

February 2014- This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you'll find out all about AETs, and get ...

Cyber Security Index [ Source: IBM ]

January 2014- An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.

Transforming Big Data Into Insights in an IBM System z Environment [ Source: IBM ]

January 2014- This paper looks at how Big Data can be used to improve customer insight as well as operational effectiveness. It looks at the data and analytical requirements needed and at problems with traditional analytical environments in dealing with them. It then defines new requirements to accommodate Big Data analytical workloads and shows how your analytical Infrastructure needs to change to accommodate these extraordinary requirements and deal with the diversity of today's data as well as ...

High volume Database Activity Monitoring z/OS [ Source: IBM ]

January 2014- This document discusses various database activity monitoring concepts and topics, and also includes a supplemental technical discussion regarding the performance characteristics of the IBM? InfoSphere Guardium solution.

A Defense in Depth Approach for the IBM System z Platform [ Source: IBM ]

January 2014- When mainframes were introduced in the early 1960s, networks were small and well-defined. Users were few and known within the organization. To gain access, a person needed to be on the premises, usually during regular hours. Physical data may have been susceptible to removal or theft, but if an unauthorized user did get into the system, the information stored there was typically limited to transactions and batch processing.

Today, in the era of ...

Biometrics [ Source: UL ]

November 2013- UL tested, analyzed and ultimately helped ensure the functionality and security of an innovative fingerprint authentication system.

Transaction Security Journal [ Source: UL ]

November 2013- Learn more about how UL is facilitating the adoption of new technologies, while working to make transactions safe and secure.

2013 Gartner Magic Quadrant for Enterprise Backup / Recovery [ Source: Asigra ]

October 2013- Gartner published its Magic Quadrant for Enterprise Backup/Recovery for companies to pilot the many solutions to address their backup/recovery needs.

Big Data Demands Big Changes To Legacy Backup [ Source: Asigra ]

October 2013- Download the Storage Switzerland report on backup software licensing placing undue burden on organizations and the new era of licensing to improve efficiencies and costs.

Boosting Enterprise Security With Integrated Log Management [ Source: IBM ]

November 2013- This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how security risks and facilitating compliance, and introduces how IBM Security QRadar Log Manager can help organizations stay a step ahead of the latest security threats.

2013 Gartner Critical Capabilities For SIEM [ Source: IBM ]

November 2013- IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases.

Gartner notes that SIEM technology is an important element of an organization's security strategy, because it establishes a consolidation point for all forms of security monitoring and can be ...

Delivering Success That Scales with the Largest Enterprises [ Source: IBM ]

November 2013- This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how security risks and facilitating compliance, and introduces how IBM Security QRadar Log Manager can help organizations stay a step ahead of the latest security threats.

Vormetric Data Security to Enhance Security Intelligence [ Source: Vormetric ]

October 2013- When the barbarians penetrate the perimeter, how do you protect your critical data? Learn why combining Vormetric Security Intelligence with your SIEM is the next step in protecting your enterprise. You can pinpoint unusual patterns that indicate malware, detect possible malware or malicious insiders, and more.

How Public Sector Organizations Can Overcome Data And Audit Protection Challenges [ Source: Vormetric ]

October 2013- Public sector organizations must protect critical data and meet compliance and cybersecurity requirements, while gaining security intelligence across physical, virtual, cloud and big data environments. Learn how Vormetric provides a single platform that can provide data security and operational efficiency in a variety of use cases.

Simplify Data Security For Cloud Environments [ Source: Vormetric ]

October 2013- Make your transition to the cloud confidently and protect what matters most. Meet exacting compliance requirements with a solution that is transparent, strong, easy, and efficient.

Securing - Big Data [ Source: Vormetric ]

October 2013- We are awash in data, but enterprises must still protect their sensitive data, no matter where it resides. Traditional data security approaches such as perimeter security have proven to be permeable and put big data initiatives at risk. Learn about a new way to safeguard sensitive information in big data environments.

Guidelines for Choosing an Advanced Authentication Solution for Accessing Criminal Justice Information System (CJIS) Services [ Source: SafeNet ]

October 2013- For law enforcement agencies, timely information sharing is critical for stopping and reducing crime. Criminal Justice Information (CJI) is shared at all levels starting at the federal level through state and even municipal local agencies. With the crucial need to share CJI comes the need to protect this sensitive information, the leakage of which can affect the effectiveness of ongoing crime fighting operations.
The Criminal Justice Information Services (CJIS) Security Policy defines the requirements ...

Next 25