Cerberus: Malware Triage and Analysis
[ Source: AccessData Group ]
October 2012-
This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...
Considering Moving IT To The Cloud? Top 10 Things You Should Know
[ Source: Acumen Solutions ]
December 2009-
Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Organizations moving to the cloud must consider the challenges, which include data security, rapid adoption, integration with legacy systems, IT governance, and change management. This document provides a check list of the top 10 things that companies should consider before moving any of their IT services to the cloud.
The SaaS-Empowered CIO
[ Source: Acumen Solutions ]
September 2009-
Moving from on-premise applications to SaaS empowers CIOs to focus on business services, IT alignment, and agile
delivery. Freed from the infrastructure adoption-obsolescence cycle, CIOs can address critical issues around securing
information assets and insuring data quality, availability and just-in-time delivery.
How To Provide Government Services Through Social Media: Tips Revealed
[ Source: Adobe ]
September 2010-
This IDC Government Insights White Paper discusses government's new efforts to achieve its goals regarding service delivery to citizens, businesses, and other government agencies.
Today, more than ever, citizens are looking for their government leaders to keep them informed and support their needs. And citizens increasingly expect to interact with government on their terms, 24 x 7, and not only receive information but also conduct their government business through self-service when possible.
As ...
Harnessing the Power of the Mobile Cloud
[ Source: Antenna Software ]
October 2012-
This whitepaper discusses the convergence of mobility and cloud computing and discusses six strategic advantages by harnessing the power of the Mobile Cloud for driving competitive differentiation and delivering happiness to employees and customers.
Enterprise Mobility Management 2012 The SoMoClo™ Edge
[ Source: Antenna Software ]
October 2012-
IT must consider enterprise mobility, like public and private cloud deployments, as essential IT infrastructure. This is the core premise of this study - that enterprise mobility has come of age, and that measurable business value accrues for organizations that manage their mobile infrastructure as secure, compliant, and performance-optimized as all other IT assets. The study based on an online survey of over 260 organizations in 45 countries, conducted in February and March 2012.
The Move Toward Shared Services: An Examination of the Business Models and IT Trends Driving Public Sector Adoption of Shared Services
[ Source: BEA Systems ]
January 2008-
This paper explains the growing business and operational IT trends that are causing government bodies to offer Shared Services. The paper moves from outlining the business case for Shared Services toward a discussion of architectural control points and service features. Shared Services are composite applications made available via technologies such as Web services, which simultaneously reduce costs and enable more dynamic results. They bridge legacy and newly developed applications across diverse organizations to provide the ...
Forrester: Prepare For Anywhere, Anytime, Any-Device Engagement with a Stateless Mobile Architecture
[ Source: Blue Coat ]
October 2012-
This report outlines Forrester's future look for mobile security and operations. This report is designed to help security and risk (S&R) and infrastructure and operations (I&O) executives understand and navigate the major business and IT trends that will affect the development of a future-proof mobile support strategy.
IDC: Top Five Considerations for Cloud-Based Security
[ Source: Blue Coat ]
October 2012-
According to IDC's 2011 Security Survey, nearly two-thirds of enterprises are challenged by end users who do not follow corporate securities policies. Cloud-based Web solutions can secure mobile users without requiring VPN backhaul to an onsite gateway or security agents installed on clients. In this whitepaper Phil Hochmuth, program manager for IDC's Security Products service answers the top 5 questions to consider if you plan to move to cloud-based security.
Nemertes Research: Mobile Security Challenge Emerges
[ Source: Blue Coat ]
October 2012-
This report examines the security challenges and requirements for the hybrid fixed and mobile workplace of today and demonstrates how the mix of on-premise and cloud applications in the enterprise needs an array of security solutions directed by a flexible security policy that follows the user, regardless of device or location.