Sort results by: Published date | Company name
Showing items 1-25

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions [ Source: Trend Micro ]

July 2014- This Trend Micro-commissioned profile of North American, European, and Asia Pacific IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester’s own market data, and a custom study of the same audience.

NSS Labs Report: Breach Detection Systems Comparative Analysis [ Source: Trend Micro ]

July 2014- In recent NSS Labs testing, Trend Micro Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire.

Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should be on your product short list.

Cybersecurity for Dummies eBook [ Source: Palo Alto Networks ]

July 2014- APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security ...

Still Using Proxies for URL Filtering? There's a Better Way [ Source: Palo Alto Networks ]

July 2014- Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and stateful inspection firewall devices that offered deeper levels of access controls. Unfortunately, these traditional firewalls shared a common shortcoming - an inability to see all ...

3 Questions to Ask Your DNS Host [ Source: Neustar ]

June 2014- Learn the three key questions you should be asking your DNS host when it comes to protection against DDoS Attacks.

White Book : Cloud Security - The Definitive Guide to Managing Risk in the New ICT Landscape [ Source: Fujitsu America Inc. ]

June 2014- Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organizations, the journey to cloud is no longer question of "if" but rather "when", and a large number of enterprises have already travelled some way down this path.

However, there is one overwhelming question that is still causing many CIOs and their colleagues to delay their move to cloud: Is cloud computing secure? As many unwary businesses have ...

5 Reasons to Converge Video Surveillance onto the Corporate IP Network [ Source: Allied Telesis ]

June 2014- With the evolution of IP surveillance technology, the emphasis has moved from simple monitoring of video footage to intelligent systems that are capable of identifying abnormal events or monitoring behaviour. As intelligence increases in these systems, so too do the applications for this technology. Consolidating all applications within an organisation onto a single infrastructure provides many benefits but can also pose many challenges. To learn more about how to overcome these challenges and make the ...

The Insider Threat: Detecting Indicators of Human Compromise [ Source: Tripwire ]

June 2014- Your organization's greatest asset is also its greatest risk. The employees, contractors and trusted business partners you rely on to keep your organization running can also cause it the most damage. A malicious insider can use authorized credentials to do unauthorized things, bring your network down or repeatedly steal data from your organization without being detected.

Learn about the Insider Threat Kill Chain and what you can do to protect your organization from ...

Stopping Zero Day Exploits Dummies Book [ Source: IBM ]

June 2014- Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there?

Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, ...

Selecting the Right Cybercrime-Prevention Solution [ Source: IBM ]

June 2014- Financial institutions, commercial enterprises and government organizations are all prime targets for cybercrime. Malicious software, or malware, is the primary attack tool used by cybercriminals to execute account takeover attacks, steal credentials and personal information, and initiate fraudulent transactions. The attack tactics, or crime logic, are constantly becoming more sophisticated so they can continue to exploit human and system weaknesses. Fraud-, risk- and IT-security professionals are looking to establish an effective defense against these attacks.

The Thriving Malware Industry: Cybercrime Made Easy [ Source: IBM ]

June 2014- The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today's virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.

2014 Neustar Annual DDoS Attacks and Impact Report: A Neustar High-Tech Brief [ Source: Neustar ]

June 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

June 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

10 Things Your Next Firewall Must Do [ Source: Palo Alto Networks ]

June 2014- For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions your ...

Security Configuration Management For Dummies [ Source: Tripwire ]

May 2014- Securing your server and network configurations may be the smartest security work you can do. Why? Continually protected and hardened systems keep your data safe, repel exploits and provide measurable confidence. But it's hard to do. How do you get started? What are the capabilities to look for in an effective solution?

Security Configuration Management For Dummies shows you how to:

• Adopt and implement a security hardening policy

&...

Reducing Costs with Next-generation Network Security [ Source: Palo Alto Networks ]

June 2014- This paper details real cases from three businesses, the legacy infrastructure they replaced, the Palo Alto Networks next-generation security platform they deployed, and the substantial savings they realized - cutting capital and operations costs by 50% on average.

I Have to Trust Someone...Don't I? [ Source: CA Technologies ]

June 2014- "Trust" does not mean giving employees unrestricted and unnecessary access to information. With the right security controls, organizations can significantly reduce their exposure to the risk of insider threats. The key is to find the right balance between employee enablement and control, while holding employees accountable for their actions. This requires a broad approach to allow an organization to carefully manage its identities, access and data, from identity management, to governance, privileged identity management and ...

Defending Against Advanced Persistent Threats: Strategies for a New Era of Attacks [ Source: CA Technologies ]

June 2014- The traditional dangers IT security teams have been facing - andovercoming - for years are being replaced by a far more hazardous, insidious form of attack: the Advanced Persistent Threat (APT).

Identity-Centric Security: Enabling and Protecting the Business [ Source: CA Technologies ]

June 2014- IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant-today's IT must deal with highly distributed identities across the entire business environment that come from many sources-applications, systems, social media, etc. In addition, mobile employees and customers are changing the face of business, and redefining the challenge of ...

Building an Intelligence-Driven Security Operations Center [ Source: RSA ]

May 2014- This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.

Take Charge of Security in a Hyperconnected World [ Source: RSA ]

May 2014- Read how organizations can improve breach readiness and cyber security maturity and see recommendations for areas with greatest opportunity for improvement.

Privileged Accounts and Passwords: Risk Management in Civilian Agencies [ Source: Dell Software ]

June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Adding Extra Security to Cloud Storage [ Source: Sophos ]

May 2014- Many companies take a restrictive approach to public storage services such as Dropbox by applying web filtering to block access or by applying application controls to prevent cloud storage applications from being installed.

Download this whitepaper and find out how applying data encryption everywhere enables users to manage access to the cloud without placing data or businesses at risk.

Encryption Buyers Guide [ Source: Sophos ]

May 2014- Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from attackers — yet many organizations have shied away from comprehensive encryption because the technology was too complicated or onerous for end users. But things are changing.

This guide will help you:
- Examine the capabilities to look for when evaluating endpoint encryption solutions
- ...

Regulations and Standards: Where Encryption Applies [ Source: Sophos ]

May 2014- Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether it's PCI DSS, SOX, HIPAA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

This whitepaper describes the different types of data under regulation and offers best practices for implementing appropriate encryption technologies. Download this whitepaper and learn:

• Tips on protecting your data in today’s complex security landscape
• How to ...

Next 25