Sort results by: Published date | Company name
Showing items 1-25

Extend Compliance And Risk Management To What Really Matters For Your Business [ Source: Absolute Software ]

September 2014- While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders - not on protecting the business itself. Companies rarely fail because of poor financial controls, but they fail frequently due to their inability to understand and address disruptive technologies, market fluctuations, changing customer ...

Endpoint Security Trends [ Source: Absolute Software ]

September 2014- This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.

You don't Have to Sacrifice Performance for Security [ Source: SanDisk ]

September 2014- Complimentary white paper on high-performing, secure and affordable SanDisk SSDs.

Guide to Data Security [ Source: DLT / Symantec ]

September 2014- Protecting the government's data is an all-consuming, top priority. As the federal government's data growth continues to spiral, and as the types of data threats and leakage change, data and storage managers have no choice but to be on the front lines of protecting their agencies' data. That means first building a solid data storage and management foundation – one that ensures that all data is accounted for at all times and that it's continually backed ...

White Paper: Web Application Scanning with Nessus [ Source: Tenable ]

September 2014- Why is it that so many web applications are certified to be compliant with a particular standard such as PCI DSS and yet are still compromised? According to data compiled by the DatalossDB project, breaches caused by web applications and web-related flaws comprise 11% of all breaches while another 18% fall into the "hack" category (some of which are likely web application related).
Is the scanner the problem? Is it the auditor? On the other hand, ...

White Paper: Vulnerability Management and Risk Assessment for the Cyber-Security Framework [ Source: Tenable ]

February 2014- This paper provides insight to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, which calls for "a set of industry standards and best practices to help organizations manage cybersecurity risks". Specifically, this paper describes how Tenable’s solutions can be leveraged to help meet the guidelines and practices outlined in the components of the Cybersecurity Framework. Organizations can use the Framework to focus on a risk - based approach to align its vulnerability ...

White Paper: Continuous Monitoring for the New IT Landscape [ Source: Tenable ]

July 2014- Recent breaches have targeted a fatal flaw in the way organizations have approached security over the last two decades. While the focus has been on investing in multiple preventive security technologies-centralized authentication, desktop virus prevention, automated patching, next generation firewalls, sandboxes for zero-day malware, and security event management-adversaries have taken advantage of blind spots that have widened as the IT landscape has evolved. The recent breaches occurred not because of unknown weaknesses in the defensive ...

White Paper: Speed Up Incident Response with Actionable Forensic Analytics [ Source: Tenable ]

July 2014- Tenable provides a comprehensive continuous network monitoring solution that enables you to rapidly respond to security incidents, by providing actionable forensic data that can help detect incidents more accurately. In this paper, we will explore the forensic analytics and incident response capabilities of Tenable SecurityCenter Continuous View (SC CV), a network security platform that identifies vulnerabilities, reduces risk, and ensures compliance. Topics covered will include:

• Recognizing how organizational silos and inefficient process ...

Vendor Landscape: Endpoint Protection [ Source: Trend Micro ]

September 2014- Info-Tech Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry.
See how Trend Micro Smart Protection for Endpoints measured up against today’s requirements:

- Protection for data on the move
- Interfaces that are highly interactive
- Expanded platform integration
- Backed by a strong vendor

Securing Business Information in the Cloud [ Source: Box ]

September 2014- Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and end users, but adapting security controls and tools to a decentralized architecture has proven difficult. As a result, the modern enterprise is burdened with challenges like insecure devices ...

An Alternative to Today's Distributed Content Security Chaos [ Source: Box ]

September 2014- Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with status quo solutions won't work, so what will? ESG believes it's time for CIOs and CISOs to take a long look at centralized cloud-based content management services. New offerings provide enterprise ...

Privileged Identity Management [ Source: Gemalto ]

September 2014- Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.

Privileged users exist in every organization and they ...

Seven Steps to Creating an Effective Computer Security Incident Response Team [ Source: Absolute Software ]

September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.

Blue Coat SSL Visibility [ Source: Blue Coat ]

September 2014- To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

SANS Analyst White paper: Finding Hidden Threats by Decrypting SSL [ Source: Blue Coat ]

September 2014- This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

Blue Coat's Encrypted Traffic Management Interactive E-Guide [ Source: Blue Coat ]

September 2014- According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.

What you will learn:

• How Encrypted traffic is growing exponentially and how it ...

Stop Attacks Hiding Under the Cover of SSL Encryption [ Source: Blue Coat ]

September 2014- Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

Consumer Web Portals at Risk [ Source: RSA ]

September 2014- This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.

Card-Not-Present Fraud in a Post-EMV Environment [ Source: RSA ]

September 2014- This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.

The State of Advanced Persistent Threats [ Source: IBM ]

September 2014- Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective.

In Advanced Persistent Threats (APTs) and targeted attacks, attackers use a myriad of tools and techniques to breach into an organizations' network, steal sensitive information and compromise its operations. Many APTs are launched with a specific purpose such as to gather information, including financial data, PII, or ...

Building an Intelligence-Driven Security Operations Center [ Source: RSA ]

September 2014- This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.

Transform Traditional Security Strategies into an Early Warning System for Advanced Threats [ Source: RSA ]

September 2014- To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.

Enterprise Strategy Group Report: The Big Data Security Analytics Era is Here [ Source: RSA ]

September 2014- Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era.

The Seven Stages of Advance Threats [ Source: WEBSENSE, INC. ]

October 2013- Today's advanced threats occur in "kill chains" of up to seven stages. These attacks easily evade traditional filtering and anti-virus defenses to steal your organization’s valuable data.

Advanced threats can be stopped at any stage - if you deploy the proper cybersecurity solutions.

We've prepared a report to help you understand this advanced threat kill chain. You'll learn about each stage and how cybercriminals use them in their attacks. And ...

Case Study: Cadence Design Systems Finds Customer-Critical Bugs with UndoDB for Linux [ Source: Undo Software ]

September 2014- Developers of complex C++ code for memory-intensive software applications need greater insight into their code during debug. The situation intensifies when it's a customer-critical bug and the data needed can't leave the customer's site. This case study describes how Cadence Design Systems, a leading company in the electronic design automation (EDA) segment, utilized UndoDB for internal debug of complex Linux applications and collaborated to utilize UndoDB for onsite customer-critical bugs.

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce [ Source: Absolute Software ]

August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.

Next 25