Sort results by: Published date | Company name
Showing items 1-25

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce [ Source: Absolute Software ]

August 2014- The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute Computrace.

Fight Cyber Crime with Splunk, Cisco, and Red Hat [ Source: Red Hat ]

August 2014- The cost of cyber crime across the globe has already grown to $100 billion annually, not counting the intangible damage to enterprise and government security. In addition to the data loss and security breach, there is immeasurable, and sometimes irrevocable, damage to the brand.

Analyzing machine data from firewalls and perimeter devices in real time to thwart - and predict - threats is the only defense for most institutions. However, the amount of data ...

5 Steps to Application-Aware Data Protection [ Source: CommVault ]

August 2014- Many IT organizations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create ...

Zen and the Art of Identity Federation [ Source: Radiant Logic ]

August 2014- Has your identity infrastructure hit choppy waters? Set Sail for stronger authentication, richer authorization, and smarter security for all your identity initiatives. RadiantOne delivers a global view of identity on top of your previous identity investments, for faster deployments, lower integration costs, and all the flexibility you need to navigate changing business requirements

Don't Drink Sour Milk: Avoidable Risks in the New World of Application Security [ Source: Sonatype ]

August 2014- There has never been a more interesting, important and challenging time to be a software security professional than right now. Applications are the new vector of attack, development is going faster than security can keep up and most source code has been replaced by open source components. Read this rant to understand more about the new landscape of modern application development. Find out what's really happening in the world of 'assembled' development and learn how ...

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management [ Source: CommVault ]

August 2014- Massive data growth and shrinking application recovery windows are creating a huge challenge for IT administrators. Legacy backup models can't cope with multi-terabyte applications. However, by leveraging a modern approach to data protection that uses your current disk array snapshot technology, you can leave your recovery problems behind. This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap Recovery Manager can make your application recovery fast and reliable.

5 Strategies for Modern Data Protection [ Source: CommVault ]

August 2014- It's no secret that today's unprecedented data growth, datacenter consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you're poised to meet future demands.

The Human Factor: How Attacks Exploit People as the Weakest Link in Security [ Source: Proofpoint ]

August 2014- Get Insight into the ways attackers exploit end-users' psychology. Learn how attackers exploit end-users have significant security implications for enterprise preparedness and defensive strategies

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection [ Source: Proofpoint ]

August 2014- As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks and new sophisticated forms of malware. Organizations can't rely solely on traditional blocking gateways, but must invest in prevention, detection, response and predictive capabilities for complete protection.

The True State of Open Source Security [ Source: Sonatype ]

August 2014- The 4th annual Open Source Development Survey has been analyzed, sliced and diced and now incorporated into a compelling infographic. See what 3300+ participants told us about the state of open source development, policies, license management, security processes, breaches and more. Learn 4 easy steps you can take to start securing your open source development practices today.

eDiscovery Digital Investigations Solution [ Source: Symantec ]

August 2014- More Digital Investigations, More Email and Documents, but No More Time? Solve digital investigations 10 times faster! Information technology and security professionals at agencies have realized immediate and significant results using eDiscovery Digital Investigation Solution.

Why Threat Intelligence is Critical for Next-Generation Firewalls [ Source: Dell Software ]

August 2014- Few organizations evaluating a next-generation firewall take the time to look at the threat intelligence network behind it. Yet this security resource analyzes and distributes intelligence that is essential to blocking advanced malware, zero-day attacks, targeted attacks and other advanced threats.

A top-tier threat intelligence network makes a major difference between a really effective next-generation firewall (NGFW) and a mediocre one, and some vendors invest far more in this area than others. This ...

Next-Gen Security [ Source: Dell Software ]

August 2014- SSL decryption and inspection keeps attackers away from your data and out of your network. Today between 25 and 35 percent of enterprise traffic is secured using the secure sockets layer (SSL) protocol, according to NSS Labs. In some vertical industries SSL traffic comprises as much as 70 percent of network traffic. This is expected, since SSL is commonly used for everything from e-commerce to online banking. More recently, however, cybercriminals have started using SSL to hide their ...

Achieve Deeper Network Security and Application Control eBook [ Source: Dell Software ]

August 2014- Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are simply not effective in today's advanced-threat environment. To safeguard your organization from today's ever-evolving threats, your NGFW must be able to deliver a deeper level of network security. To combat growing security challenges, more organizations are migrating from traditional firewalls that focus only on stateful packet inspection (...

Security Considerations When Undergoing A Network Refresh [ Source: HP ]

August 2014- Corporate networks are under a constant state of siege - not just from threats but from the pressure of supporting the ever-growing number of clients, devices and platforms that have resulted from the BYOD phenomena. Network demands will only increase as we move to the "internet of things" adding sensors and instrumentation of all types to the list of security burdens.

As a result, many organizations are planning network refreshes to ensure bandwidth ...

Building a Better Network Security Strategy [ Source: HP ]

August 2014- In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. A comprehensive network security solution needs to include a number of factors, including network reliability, resources for managing the network, network features and functions, and full integration.

This Slashdot Pulse offers insight into IT professionals who currently manage network security, giving readers a glimpse into real-word security plans and tactics. <...

How to Improve Productivity While Minimizing Risk in Open Source Development [ Source: Sonatype ]

August 2014- The last ten years have seen a revolution in the way software is developed and delivered. Organizations have moved away from tedious custom source code programming in favor of quicker component-based approaches. However, most application security technologies are designed for source code not components. This gap leaves most application code vulnerable to security threats, licensing issues and performance defects. Understand how Component Lifecycle Management addresses this problem in refreshing new ways.

Understanding & Addressing OWASP's Newest Top Ten Threat: Using Components with Known Vulnerabilities [ Source: Sonatype ]

August 2014- Many organizations turn to the Open Web Application Security Project (OWASP) to help ensure that their code and applications are secure. Recently OWASP's Top Ten list of application security risks was updated to include "A9: Using components with known vulnerabilities." This means organizations need to expand their security approach to accommodate components - which are reusable blocks of code that are assembled together to create an application. These re-usable components now comprise 90% of an average ...

7 Security Gaps in the Neglected 90% of Your Application [ Source: Sonatype ]

August 2014- Software applications need to be delivered faster and across more platforms than ever. To build high quality software in short order, we've seen a dramatic shift from source code to component-based development, with open source and third party components providing the innovation and efficiency that developers need. Unfortunately, our dependence on components is growing faster than our ability to secure them. Worse yet, components are increasingly the preferred attack surface in today's applications. The combination ...

Email Security For IT: How to keep your Brand Safe [ Source: Dyn ]

August 2014- In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

5 DNS Security Risks That Keep You Up At Night [ Source: Dyn ]

August 2014- When it comes to keeping your DNS secure, do you know what you're up against? Here are five of the most pervasive DNS threats that you need to be thinking about, and how to keep them from creating a performance or security nightmare.

Everything You Need to Know about a DDoS Attack [ Source: Dyn ]

August 2014- For ecommerce giants, just a second of downtime could mean thousands in lost revenue. Even if your company isn't as large as Amazon or eBay, any amount of profit loss due to downtime should be cause for concern. Not only do you miss a potential sale in real time, that customer is less likely to come back and try to purchase from you again in the future.

Critical Data Protection Program by IBM Security Services [ Source: IBM ]

August 2014- Critical data is the small but most important portion of data vital to business survival and success. It includes sensitive financial and customer data, data that enables critical business processes, and proprietary data such as trade secrets, intellectual property, research and development, and confidential business plans and communications, learn how IBM can help you protect your companies important data.

Gartner Study: Magic Quadrant for Global MSSPs [ Source: IBM ]

August 2014- Latest Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute" and "completeness of vision".

2014 Selecting a Managed Security Services Provider: Top 10 criteria [ Source: IBM ]

August 2014- A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

2014 Ponemon Cost of Data Breach Study [ Source: IBM ]

August 2014- The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States.

Next 25