Sort results by: Published date | Company name
Showing items 1-25

SonicWall 2013 Threat Report [ Source: Dell Software ]

June 2014- This report summarizes statistics for 2013 and outlines predictions for 2014 focusing on trends in zero-day vulnerabilities and new cybercriminal tactics.

Solving the Security Puzzle: How Government Agencies Can Mitigate Today’s Threats [ Source: Dell Software ]

June 2014- This white paper unveils best practices and technology solutions that help government agencies minimize the risk of security breaches.

Connected Security for FICAM and SICAM with Dell One Identity Solutions [ Source: Dell Software ]

June 2014- Dell solutions map to all areas of the FICAM and SICAM frameworks: Credential, identity, and access mgmt, federation, and auditing & reporting.

Five Things To Do After An Attack The Unique Challenges of Dealing with an Advanced Persistent Threat [ Source: Hexis Cyber ]

May 2014- After an organization been hacked, reducing the amount of time an APT lives within the environment is paramount.

To get the job done organizations must deploy a methodical approach that includes steps to detect/identify, contain - or perhaps not, and remove/recover from the attack as quickly as possible. But the process can't stop there. Attackers are increasingly creative in their methods of attack. To truly gain an advantage against attackers, security ...

Simplifying Employee Investigations [ Source: SpectorSoft Corporation ]

March 2014- You just got news of yet another issue that just happened in your business that now you need to deal with - it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. ...

Insider Threat Survey Report [ Source: SpectorSoft Corporation ]

March 2014- Are you Catching the Signals

The insider threat is alive, thriving and often responsible for major data breaches that expose everything from consumer credit-card information to valuable intellectual property (IP), and the findings of our most recent survey support this assertion. The results from a pool of 419 enterprise-security respondents revealed that 23 percent of enterprises have experienced insider-driven data breaches.

Download this report and read more about 10 alarming Insider Threat trends.

Implementing an Employee Monitoring Program [ Source: SpectorSoft Corporation ]

March 2014- Security & Risk professionals recognize the value and benefits of implementing an employee-monitoring program. Privacy advocates and Legal and Human Resources professionals see potentially unwarranted invasion of employee privacy as reasons not to monitor, or at least to restrict monitoring to instances where enough "probable cause" exists to warrant tilting the balance between the privacy of an employee and the interests of the company.

In this whitepaper you will learn how to assist company ...

Transparency in the Public Cloud: Eliminating Public vs Private Tradeoffs [ Source: iland ]

March 2014- It's now possible to get the same visibility in the public cloud that you have in your own data center - or even better. A Best of Interop 2014 finalist, analysts and media agree that the new iland Enterprise Cloud Services portal provides unmatched visibility into the true costs of cloud as well as performance, security and compliance data.

According to Torsten Volk, research director at Enterprise Management Associates, "iland's new portal exemplifies the ...

Disaster Recovery: The Budget Item You Cannot Afford to Cut [ Source: iland ]

March 2014- According to a recent survey, the cost of downtime over the last few years increased 65 percent. Not surprisingly, growing technology dependence can expose companies to threats from human error, cybercrime and natural disaster - causing their digital infrastructures to come crashing down in a split second.

Read "Disaster Recovery: The Budget Item You Cannot Afford to Cut" and learn why virtualization ensures business continuity; how one company's strong DR plan results in millions ...

Simpana Software Storage Efficiencies Calculator [ Source: CommVault ]

March 2014- CommVault Simpana software combines archiving, backup, reporting, snapshot management, eDiscovery, and secure data access into a single software platform - an industry first.

Forrester Wave Report for Enterprise Backup & Recovery [ Source: CommVault ]

March 2014- The enterprise backup and recovery software market is, as ever, in a state of flux as more and more I&O professionals grow tired of traditional backup methods. From missed backup windows to slow or failed recoveries, many firms are weary of the constant battle with their backup software and are looking for a change.

Operational Insight for Running IT at the Speed of Business [ Source: IBM ]

November 2013- 8 to 10 page Analyst Whitepaper by Ptak / Noel addressing the need for IT to bring Analytics technology to IT to help them be more proactive, predictive providing faster mean time to repair. This paper will also explore how IBM is helping customers with it's new IT Analytics platform that offers Search, Predict and Optimize capabilities.

Shifting IT focus from maintenance to innovation [ Source: IBM ]

November 2013- At many companies today, 70 percent of IT budgets - or more - go into maintenance and operations.1 A large chunk of the remainder typically goes toward deploying applications and configuring hardware for them. But what if you could manage the entire solution stack as a single entity, automate most maintenance tasks and deploy new applications in a matter of hours? You'd most likely be able to dedicate far more of your IT budget to innovation ...

Understanding Patterns of Expertise: Virtual Application Patterns [ Source: IBM ]

November 2013- Enterprise IT departments strive to contribute to the competitiveness of the business organization, developing and deploying innovative applications that can help benefit the bottom line and drive top-line growth. Too often, however, IT managers find themselves unable to develop and deploy applications with the agility they would like. The skills needed to quickly design, test, configure and integrate applications into complex IT environments can be difficult to find, and expert IT staff can quickly become ...

Expert Integrated Systems: Changing the Experience and Economics of IT [ Source: IBM ]

November 2013- It's never been more challenging to work in IT. The continually shifting demands of business and other organizational environments demand a quicker and more effective response from those charged with matching technology to enterprise goals. At the same time, IT faces increased pressures to reduce costs, as markets worldwide force ever-greater efficiencies in enterprise endeavors. In this e-book, we take an in-depth look at these expert integrated systems - what they are, how they work, ...

IBM Lets You Have It Your Way - Enhanced Storwize V3700 [ Source: IBM ]

November 2013- Today's small and midsized data centers need to provide the same seamless delivery of IT services as the ones of major enterprises. With Storwize V3700, IBM has tailored one system specifically to address the block storage needs of the smaller data center, with functions derived from IBM's high-end storage platforms. This paper shows how the innovative and enhanced Storwize V3700 has helped change the storage paradigm by using an IBM-developed platform.

Delivering Worry-Free Storage [ Source: IBM ]

November 2013- For small and midsize businesses, the challenge of building an IT storage infrastructure that is both effective and affordable can be daunting: the amount of information these organizations need to store is constantly increasing, while IT budgets are staying the same, or possibly even shrinking. IT managers will most likely find themselves having to do more with less. Learn how IBM's new features for low-end storage systems can increase efficiency, protect the data storage environment, ...

Surviving The Technical Security Skills Crisis - An Assessment Of The Current Security Skills Landscape And How To Overcome It [ Source: IBM ]

October 2013- The security world is a scary place, and it's getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it's becoming more difficult to recruit and retain people who really get it and know how to help. It's time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers - and the feedback ...

Reducing the cost and complexity of endpoint management [ Source: IBM ]

October 2013- IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations - helping provide continuous visibility, control and compliance while reducing costs and the burden on IT staffs.

Protect Your IT System w Next Generation Security [ Source: IBM ]

October 2013- A data breach, probings, hackers - protect your your critical IT information. What these real-life examples have in common is that perpetrators can attack companies through their IT systems. Read how trusted computing from IBM PureFlex System can help secure your systems against emerging threats.

Simplify Cloud Infrastructure with IBM PureFlex and IBM Flex System [ Source: IBM ]

October 2013- Cloud computing represents an opportunity for enterprise and service provider datacenters to become more agile and flexible by using self-service infrastructure provisioning; automated, dynamic resource pooling and scaling; and consumption-based metering to improve accelerate cloud infrastructure configuration, provisioning, and life-cycle management. IDC estimates that combined enterprise and service provider spending on IT infrastructure hardware and software for cloud datacenters will total more than $42 billion worldwide by 2017.

IDC Server Transition Alternatives : A Business Value View Focusing on Operating Costs Analyst Report [ Source: IBM ]

October 2013- Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time - but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.

An insightful and and compelling discussion by IDC that reviews the primary reason for ...

IBM Power Systems and Their Support for Business Resiliency in Challenging IT Environments? [ Source: IBM ]

October 2013- IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics.

Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC ...

Ten Reasons Why HP's Itanium-based Servers Have Reached the Point-of-No-Return [ Source: IBM ]

October 2013- Follow-on white paper on the state of the Itanium market segment after the Oracle lawsuit and subsequent release of the new Integrity systems based on the Intel Itanium 9500 processor.

GHY International: Linux, Key workloads, Density & Efficiency with IBM Power Systems [ Source: IBM ]

October 2013- Case study on the business value provided to GHY International by Linux on Power - an analyst paper

Next 25