Sort results by: Published date | Company name
Showing items 1-25

You don't Have to Sacrifice Performance for Security [ Source: SanDisk ]

September 2014- Complimentary white paper on high-performing, secure and affordable SanDisk SSDs.

Vendor Landscape: Endpoint Protection [ Source: Trend Micro ]

September 2014- Info-Tech Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry.
See how Trend Micro Smart Protection for Endpoints measured up against today’s requirements:

- Protection for data on the move
- Interfaces that are highly interactive
- Expanded platform integration
- Backed by a strong vendor

The True State of Open Source Security [ Source: Sonatype ]

August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.

Old Techniques, New Channel: Mobile Malware Adapting PC Threat Techniques [ Source: IBM ]

August 2014- With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.

White Book : Cloud Security - The Definitive Guide to Managing Risk in the New ICT Landscape [ Source: Fujitsu America Inc. ]

June 2014- Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organizations, the journey to cloud is no longer question of "if" but rather "when", and a large number of enterprises have already travelled some way down this path.

However, there is one overwhelming question that is still causing many CIOs and their colleagues to delay their move to cloud: Is cloud computing secure? As many unwary businesses have ...

Privileged Accounts and Passwords: Risk Management in Civilian Agencies [ Source: Dell Software ]

June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Connected Security for FICAM and SICAM with Dell One Identity Solutions [ Source: Dell Software ]

June 2014- Dell solutions map to all areas of the FICAM and SICAM frameworks: Credential, identity, and access mgmt, federation, and auditing & reporting.

HawkEye G: The Active Defense Grid [ Source: Hexis Cyber ]

May 2014- HawkEye G is a dynamic active defense system designed to leverage existing security assets while providing advanced cyber security analytics and automated countermeasure techniques. The combination of the traditional signature-based and new behavior-based heuristics leads to heightened awareness of standard network activity and deviations that could indicate a potentially disastrous situation. Understanding the full threat and defense landscape is crucial for cyber security mitigation and the HawkEye G team has invested the time and resources ...

Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

April 2014- For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar’s survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Larger attacks are more common, but most attacks are still less than 1 Gbps. More than half of attacked companies reported theft of funds, data or intellectual property. Read the full report to learn how ...

Managing security risks and vulnerabilities [ Source: IBM ]

April 2014- With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Defending against increasingly sophisticated DDoS attacks [ Source: IBM ]

April 2014- This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

IDC: Optimizing Storage With All-Flash Solutions : Analyst Report [ Source: Hitachi ]

February 2014- See how to take advantage of advancements in semiconductor technology and the popularity of NAND flash that have made NAND flash-based SSDs into a cost-effective solution for the enterprise. Find higher performance and improved responsiveness while mitigating the inefficiencies of existing hard disk drive (HDD) technology.

Advanced Evasion Techniques for Dummies [ Source: McAfee ]

February 2014- This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you'll find out all about AETs, and get ...

Cyber Security Index [ Source: IBM ]

January 2014- An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.

Transforming Big Data Into Insights in an IBM System z Environment [ Source: IBM ]

January 2014- This paper looks at how Big Data can be used to improve customer insight as well as operational effectiveness. It looks at the data and analytical requirements needed and at problems with traditional analytical environments in dealing with them. It then defines new requirements to accommodate Big Data analytical workloads and shows how your analytical Infrastructure needs to change to accommodate these extraordinary requirements and deal with the diversity of today's data as well as ...

High volume Database Activity Monitoring z/OS [ Source: IBM ]

January 2014- This document discusses various database activity monitoring concepts and topics, and also includes a supplemental technical discussion regarding the performance characteristics of the IBM? InfoSphere Guardium solution.

A Defense in Depth Approach for the IBM System z Platform [ Source: IBM ]

January 2014- When mainframes were introduced in the early 1960s, networks were small and well-defined. Users were few and known within the organization. To gain access, a person needed to be on the premises, usually during regular hours. Physical data may have been susceptible to removal or theft, but if an unauthorized user did get into the system, the information stored there was typically limited to transactions and batch processing.

Today, in the era of ...

Biometrics [ Source: UL ]

November 2013- UL tested, analyzed and ultimately helped ensure the functionality and security of an innovative fingerprint authentication system.

Transaction Security Journal [ Source: UL ]

November 2013- Learn more about how UL is facilitating the adoption of new technologies, while working to make transactions safe and secure.

2013 Gartner Magic Quadrant for Enterprise Backup / Recovery [ Source: Asigra ]

October 2013- Gartner published its Magic Quadrant for Enterprise Backup/Recovery for companies to pilot the many solutions to address their backup/recovery needs.

Big Data Demands Big Changes To Legacy Backup [ Source: Asigra ]

October 2013- Download the Storage Switzerland report on backup software licensing placing undue burden on organizations and the new era of licensing to improve efficiencies and costs.

Boosting Enterprise Security With Integrated Log Management [ Source: IBM ]

November 2013- This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how security risks and facilitating compliance, and introduces how IBM Security QRadar Log Manager can help organizations stay a step ahead of the latest security threats.

2013 Gartner Critical Capabilities For SIEM [ Source: IBM ]

November 2013- IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases.

Gartner notes that SIEM technology is an important element of an organization's security strategy, because it establishes a consolidation point for all forms of security monitoring and can be ...

Delivering Success That Scales with the Largest Enterprises [ Source: IBM ]

November 2013- This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how security risks and facilitating compliance, and introduces how IBM Security QRadar Log Manager can help organizations stay a step ahead of the latest security threats.

Vormetric Data Security to Enhance Security Intelligence [ Source: Vormetric ]

October 2013- When the barbarians penetrate the perimeter, how do you protect your critical data? Learn why combining Vormetric Security Intelligence with your SIEM is the next step in protecting your enterprise. You can pinpoint unusual patterns that indicate malware, detect possible malware or malicious insiders, and more.

How Public Sector Organizations Can Overcome Data And Audit Protection Challenges [ Source: Vormetric ]

October 2013- Public sector organizations must protect critical data and meet compliance and cybersecurity requirements, while gaining security intelligence across physical, virtual, cloud and big data environments. Learn how Vormetric provides a single platform that can provide data security and operational efficiency in a variety of use cases.

Next 25