Sort results by: Published date | Company name
Showing items 1-25

Mobile and Remote Access: Balancing Productivity and Security in a BYOD World [ Source: NetIQ ]

September 2014- In today's BYOD world, securing access and maintaining productivity is challenging; users want access from their own devices, and the applications, data and services they're accessing aren't inside the perimeter. But even in this environment, you can secure access. Read this paper to learn how you can implement access controls that keep up with the modern world. Get advice on how to take stock of your environment, leverage your current investments and keep your access ...

Is Your Identity and Access Governance Program Vulnerable to Risk? [ Source: NetIQ ]

September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...

CyberEdge: 2014 Cyberthreat Defense Report [ Source: NetIQ ]

March 2014-

As trusted experts in the field of cybersecurity, CyberEdge has provided the 2014 Cyberthreat Defense Report to demonstrate just what the current security landscape looks like. IT professionals from North America and Europe responded to a survey, and an overwhelming majority of them said their organization had been the victim of at least one attack in 2013. To mitigate that danger, organizations are expected to put more money into IT budgets in the upcoming years.

<...

Managing the Consumerization of IT [ Source: NetIQ ]

May 2014-

Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.


It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...

Advanced Persistent Threats: Hijacking Insider Credentials [ Source: NetIQ ]

May 2014-

Sophisticated groups of hackers, known as advanced persistent threats (APTs), often use stolen credentials evade security measures. So how can you know who's logging on? Learn how to spot suspicious activity before it's too late.


Individual hackers are no longer the foremost threat. APTs have evolved. These malicious actors now use sophisticated tactics to circumvent security policies. Whether people are trying to use spear-phishing scams or other means to try and ...

Contractor Access: Mitigating Security and Risk Issues [ Source: NetIQ ]

May 2014- Contractors are becoming a much larger part of modern business. But most organizations struggle to grant them the right access, and failing to do so can lead to serious security breaches. It's time to find something that will work with your environment--even when contractors are a part of it. This paper explains how you can rethink your identity and access provisioning for better security across the organization. You don't have to live with the risk ...

Enterprise Visibility, Auditing and Reporting for Windows [ Source: Dell Software ]

November 2014- Admins must achieve and prove IT compliance and security, support Active Directory (AD) migrations, and report on the configuration of AD, Windows file servers and SQL servers across their enterprise. Using a manual approach to tackle these challenges introduces the risk of security breaches and compliance failures. Discover how admins can easily identify and report on who has access to what files, folders and shares - and on what servers. Plus, learn about a scalable, ...

Managing Risk in an AD Integrated Virtualized Environment [ Source: Dell Software ]

November 2014- The ubiquity of Active Directory (AD), the rapid adoption of virtualization and the tight integration between these technologies has given rise to today's modern AD virtualized infrastructure. Read this helpful report to explore the interdependent and combined security issues between AD and virtualization. Plus, learn how to identify and manage these risks.

NSS Labs Next-Gen Firewall Product Analysis Report [ Source: Dell Software ]

November 2014- Learn why a Dell SonicWALL next-gen firewall earned the "Recommended" rating from NSS Labs for the third consecutive year in one of the industry's most comprehensive, real-world tests of firewalls, and how it earned a top score for security effectiveness.

Privileged Access Users in the Enterprise [ Source: Gemalto ]

November 2014- How do you control access to your company's most sensitive data? Do your privileged users have unchecked accessibility?

Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Gain control over who accesses your company's sensitive data with Gemalto privileged user ...

Security Evolves and Criminals Follow [ Source: Authentify ]

May 2014- This paper discusses the role of out-of-band authentication in battling e-crime.

Innovative Authentication Workflows for Protecting Online Accounts [ Source: Authentify ]

June 2014- Strengthening online services and protecting funds requires stronger techniques to thwart the wrong user armed with all the right information. Read this paper to learn more.

Make remote vendor access more secure [ Source: ObserveIT ]

July 2014- The threat of user-based attacks has never been higher, with 76% of all breaches coming from accounts with access to sensitive data. With the exploitation of remote vendor access a huge concern, learn how to make working with your contractors more secure with this free e-Book from ObserveIT.

The future of user-based security risks [ Source: ObserveIT ]

September 2014- IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches--user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.

Global Network Service Providers: Security a Position to Challenge the Botnet [ Source: Level 3 Communications ]

October 2014- A review of botnets, their evolution and methods of prevention. Download now to learn more!

Secure Cloud Networking [ Source: Level 3 Communications ]

October 2014- Secure cloud networking; learn how the biggest barrier to moving to the cloud - security - can be overcome by utilizing the right network connectivity and security bundles.

The Best Defense is a Good Offense: What Questions Should You Ask Your MSSP? [ Source: Level 3 Communications ]

October 2014- Finding the resources or the right managed security services provider (MSSP) to address the evolving cyber-security landscape can be challenging. Learn more.

Secure Data Services: A Connectivity Approach to Breaking Down the Enterprise IT Silo [ Source: Level 3 Communications ]

October 2014- The reality of today's enterprise IT environment is that change reigns supreme. With the right procurement strategy and network services provider, organizations can flex their connectivity requirements to suit. Learn how.

Level 3 SOC Threat Stats [ Source: Level 3 Communications ]

October 2014- See what the Level 3 Security Operations Center protects and monitors on a daily basis that puts them at the forefront of threat prevention and analysis.

Energy Companies and Financial Services Firms Vulnerable to Data-Breaching Malware [ Source: ThreatTrack Security ]

October 2014- Financial services firms and energy companies – two industries highly targeted by cybercriminals – must move quickly to address their cybersecurity deficiencies and shore up their defenses against advanced malware threats.

No Respect. CISOs Misunderstood and Underappreciated by their C-Level Peers [ Source: ThreatTrack Security ]

October 2014- C-level executives regard the role of CISO primarily as a target for finger-pointing in the event of a data breach, and have little faith that individuals in the role could hold other leadership positions.

Prevent Data Breaches with Stronger Email Security [ Source: ThreatTrack Security ]

October 2014- Email remains the #1 threat vector for many organizations. To fight the onslaught of cyber threats, nothing short of a multilayered security architecture, backed by strict security policies and staff training, can protect an organization.

Leveraging Metadata for a Proactive Defense [ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]

October 2014- All too often network security professionals are forced into an escalating workflow-an arms race remediating alerts (indicators of attacks) as they come in, instead of proactively hunting for the adversary-who is likely already in your network. Resource and time constraints, as well as a lack of visibility and the right tools, lead to a best effort security posture (doing everything you can to stay above the rising tide of incoming attacks).

Access to ...

Comprehensive Advanced Threat Defense [ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]

October 2014- The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it is the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses.

We like to define advanced threat defense in terms of the adversary rather than the ...

Security incident response plan that actually works [ Source: IBM ]

October 2014- This brief offers a look at the top ten mistakes security organizations make with their Computer Security Incident Response Plans.

Before the breach [ Source: IBM ]

October 2014- Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.

Next 25