Sort results by: Published date | Company name

Evaluating Managed File Transfer in the Cloud: What You Need to Know [ Source: Ipswitch File Transfer ]
December 2012- As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs of each. And this decision does not need to be "either-or"; for many companies an enterprise solution for managing secure file transfer encompasses both cloud hosted and on-premise options.

This white paper from Osterman Research details advantages to consider for managing file transfer operations in the cloud, and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

The State of DDoS Protection: Organizations Remain Unprepared for DDoS Attacks [ Source: Neustar ]
December 2012- Distributed denial-of-service (DDoS) attacks continue to grow in size, complexity and danger. Witness the recent wave of attacks on major U.S. banks, which knocked websites offline, angered customers and took a grave toll on brand reputations. The lessons of those attacks echo the findings of this report: Previously successful DDoS mitigation solutions no longer work.

UBM Tech conducted research with IT professionals who have suffered DDoS attacks. The drastic changes in attack ...

[WHITE PAPER]
Read Abstract | Go to White Paper

A New Breed of Information Security Leader: The Hyper-Connected Era and What It Means for CIOs and CISOs [ Source: IBM ]
December 2012- 2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?

[WHITE PAPER]
Read Abstract | Go to White Paper

Consolidated Security Management for Mainframe Clouds [ Source: IBM ]
December 2012- IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

[WHITE PAPER]
Read Abstract | Go to White Paper

How Does IBM Deliver Cloud Security [ Source: IBM ]
December 2012- Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualised environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and deprovisioning environment while experiencing the loss of ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Intelligent Role Management for Improved Security and Compliance [ Source: IBM ]
December 2012- In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are overly complex and are not suited for business users. To find out how the integrated Role and Policy Modeler component of IBM Security Identity Manager ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Close Encounters of the Third Kind [ Source: IBM ]
December 2012- This white paper presents the results of a research study on the prevalence of client-side JavaScript vulnerabilities, conducted by the IBM Security (formerly, IBM Rational) application security team. For this study, the researchers used IBM JavaScript Security Analyzer (JSA) technology, which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. This kind of analysis is superior to and more accurate than regular static ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Your Organization Has Just Been Attacked by Malware - Now What? [ Source: Sourcefire ]
December 2012- Jumping the gun? Maybe. But odds are it will happen.

Be ready with your Advanced Malware Survival Kit.

Download our Incident Response Brief: 4 keys to effective malware response From there, access:
• Videos: See the power of malware visibility and control from the network to end-devices
• Special Offer: 100 Free Seats of advanced malware protection

Download the Advanced Malware Survival Kit Now and be prepared before the next attack!

[WHITE PAPER]
Read Abstract | Go to White Paper

3 Strategies to Protect Endpoints from Risky Applications [ Source: Dell KACE™ ]
November 2012- Cyber criminals have started to look for greener pastures—namely among third-party applications. Reduce the risk profile of PC and server operating systems and protect endpoint security from risky applications. Read the white paper today.

[WHITE PAPER]
Read Abstract | Go to White Paper

Email As Part of a Business Continuity Strategy: Why always-on-business requires always-on-email [ Source: mimecast ]
November 2012- Few businesses could function without email, and email provides a critical coordination tool during an outage, yet due to the cost and complexity of providing true email continuity many businesses do not have business continuity plans that protect email adequately.

Read why continuity and archiving services may prove more cost effective for email than high-availability clustering, especially when considered in the light of continued governance, risk mitigation and compliance.

[WHITE PAPER]
Read Abstract | Go to White Paper
View All