Sort results by: Published date | Company name
Showing items 1-25

Forensic Domain Mapping: How to Reverse Engineer Domain Ownership in a Cyber Investigation [ Source: DomainTools ]

July 2014- For investigators tasked with identifying the perpetrator of online fraud, it's often the little things that can make the difference. Cyber investigators must work diligently to ferret out the smallest details in order to snare their quarry. Investigating a digital crime is not so dissimilar as investigating a crime in the 'real world'. While popular TV shows might have you believe that a single fiber found at the scene of a crime will lead directly ...

Domain Attribution: Piercing the Veil of Masked Domain Owners [ Source: DomainTools ]

July 2014- As the Internet has evolved to become a primary channel of trade and commerce, so has the sophistication of criminal organizations and other perpetrators of fraudulent schemes who take advantage of domain privacy features as a means by which to mask their true identity. Domain privacy, a controversial topic since its introduction in 2003, provides domain owners with the option to substitute the registrar's contract information for their own. While there are a variety of legitimate ...

Best Practices Guide: Using DNS Data for Threat Intelligence and Incident Forensics [ Source: DomainTools ]

July 2014- Cybercrime represents a major threat to both government and businesses, costing the economy hundreds of billions of dollars in losses every year. Often, the most challenging part for an investigator is discovering the who behind an attack. Is it a coordinated attack orchestrated by a criminal syndicate or an amateur hacker looking for a backdoor into your network? If the actual individual cannot be identified-as is too often the case-then investigators can build a Threat ...

The Public Sector Cloud Perspective [ Source: DLT Solutions ]

July 2014- Over the past decade, there have been several technology revolutions that have improved the way the public sector agencies do business-from client/server computing to virtualization, from virtualization to the Internet, and from the Internet to today's cloud computing. Learn what David Blankenhorn, Chief Cloud Technologist at DLT Solutions, has to say about the role of cloud computing, and how PaaS in particular plays in helping public sector agencies become more flexible and efficient while ...

Consolidate and Simplify Your Security Environment [ Source: SwishData ]

July 2014- How can federal organizations stay ahead of today's sophisticated, fast-changing threats, particularly when budgets are tight? It's not that agencies lack protections. Most have put in place strong perimeter defenses and other security tools, but they cannot simply stand pat against threats that are constantly devising new ways to evade defenses, compromise networks, and exfiltrate data. Agencies must be equally agile in countering evolving cyber threats. Doing so requires that they find ways to ...

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions [ Source: Trend Micro ]

July 2014- This Trend Micro-commissioned profile of North American, European, and Asia Pacific IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester’s own market data, and a custom study of the same audience.

NSS Labs Report: Breach Detection Systems Comparative Analysis [ Source: Trend Micro ]

July 2014- In recent NSS Labs testing, Trend Micro Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire.

Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should be on your product short list.

Getting Big Value out of Big Data: The Update [ Source: IBM ]

July 2014- Updated storage ebook covers XIV and DS8870 plus FlashSystem and Storwize benefits and includes case studies and resources.

Staging the Deployment of Private Clouds with IBM SmartCloud [ Source: IBM ]

July 2014- IBM is in a strong position to facilitate the deployment of private clouds. A key component of IBM’s cloud solutions is SmartCloud Foundation, an integrated set of technologies for deploying private and hybrid clouds. These hardware and software technologies are built on a common architecture, giving customers a smooth upgrade path as they advance along the maturity curve of deploying private clouds.

Stepping Into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy [ Source: IBM ]

July 2014- There's no such thing as "the cloud," says this Frost & Sullivan executive brief. It's more useful to think of the cloud as shorthand for a range of service and deployment models. This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with a focus on the SmartCloud Services portfolio offered by IBM and its partners.

Read the executive brief for usable advice on selecting the right ...

Boost Business Agility and Insight with Flash Storage for Analytics [ Source: IBM ]

July 2014- Applications, servers and IT resources are all waiting for the same thing-data. But data access depends on the response of storage. Now with IBM FlashSystem storage, you can eliminate wait times and accelerate critical applications for faster decision making. FlashSystem includes advanced technologies to help your organization effectively support analytics workloads with compelling data economics, enterprise resiliency and easy infrastructure integration. Learn more in the IBM solution brief, "Boost business agility and insight with flash ...

Big Data Analytics Infrastructure For Dummies [ Source: IBM ]

July 2014- Big Data Analytics is a critical tool to gain competitive advantage and to attract and retain happy customers. But simply deploying a software package isn't enough. Infrastructure matters for Big Data Analytics.

Analytics: A Blueprint for Value in Midmarket Organizations [ Source: IBM ]

July 2014- The IBM Institute for Business Value conducted a global study to investigate how organizations were creating value from an ever-growing volume of data obtained from a variety of sources. This resulted from data-derived insights, which then guided actions taken at every level of the organization. The findings identified nine levers that enabled the organizations to create the most value.

Read the study to see not only why it's vital for midsize companies to ...

Demystifying Industry Standards [ Source: IBM ]

July 2014- A B2B standards e-book that helps demystify the industry standards for the commerce life-cycle. "Although industry standards were designed to make business communications simpler, the specific and complex nature of the standards themselves can seem intimidating." In this eBook, we will discuss:

• How Industry Standards came about and their role within business processes.

• The fundamental differences between a variety of Industry Standards, and why complexities exist that prevent ...

Cloud Services for Dummies ebook [ Source: IBM ]

July 2014- Cloud computing is becoming an integral part of many companies' business and technology strategies. There are many different delivery models. But two foundational services are essential for cloud computing to become a strategic part of the overall computing infrastructure: Infrastructure as a Service (IaaS) for access to compute and storage resources in an on-demand model and Platform as a Service (PaaS), which sits on top of IaaS and enables you to build applications to support ...

The seven essential practices for effective business continuity management [ Source: IBM ]

July 2014- Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization's business operations and reputation is to take a proactive, business-centric approach to BCM that includes the following essential practices:

• Secure executive sponsorship for BCM

• Conduct a comprehensive ...

The Reputational Impact of IT Risk with Forbes Insight [ Source: IBM ]

July 2014- Security and resilience affect nearly every aspect of your company, including your brand value and reputation. Read this report from Forbes Insights for valuable information on:

• The costs of reputational damage to your brand value

• Where the risks are in your environment and how to better protect yourself from them

• The impact of social media on your reputational risk

• How to address the ...

Application Release Automation with Zero Touch Deployment [ Source: CA Technologies ]

July 2014- Today's agile organizations pose operations teams with a tremendous challenge: to deploy new releases to production immediately after development and testing is completed. To ensure that applications are deployed successfully, an automatic and transparent process is required. We refer to this process as Zero Touch Deployment. This article reviews two approaches to Zero Touch Deployment-a script-based solution and a release automation platform.

The article discusses how each can solve the key technological and ...

Requirements for an Application Release Automation Platform [ Source: CA Technologies ]

July 2014- Why do we need an Application Release Deployment solution? The IT world is evolving at a rapid pace. Data center and homegrown applications are increasingly complex, application changes are rising in volume and frequency, and operations are deploying across multiple environments and infrastructure models (physical, virtual and cloud). In order to keep up with increasing business demands, development teams are adopting agile methodologies, and QA is employing automated testing.

This white paper discusses ...

Cybersecurity for Dummies eBook [ Source: Palo Alto Networks ]

July 2014- APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security ...

Still Using Proxies for URL Filtering? There's a Better Way [ Source: Palo Alto Networks ]

July 2014- Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and stateful inspection firewall devices that offered deeper levels of access controls. Unfortunately, these traditional firewalls shared a common shortcoming - an inability to see all ...

IBM SmartCloud Desktop Infrastructure [ Source: IBM & Intel® ]

July 2014- Today, employees expect the workplace to come with them wherever they go and on whatever device they use. This anytime, anywhere "bring-your-own-device" (BYOD) mindset poses a dilemma for organizations. If these challenges sound familiar to you, read this solution brief to learn how IBM® SmartCloud® Desktop Infrastructure, built on pay-as-you-grow IBM System x® servers and powered by the latest Intel® Xeon® processors, can provide more cost-effective and manageable virtual desktop capabilities to help increase business ...

Private Clouds: Easing Deployment and Management [ Source: IBM & Intel® ]

July 2014- What are the key drivers of private cloud, and the requirements for effective deployment? This paper from IDC describes how IBM® System x® cloud solutions, featuring the latest Intel® Xeon® processors, offer a wide range of entry points to each individual customer, from those new to cloud computing and just getting started, to experienced users seeking higher-level capabilities.

Forrester Market Overview: Digital Customer Experience Delivery Platforms [ Source: IBM ]

July 2014- Forrester states that businesses today struggle to understand and leverage the tools necessary to create and manage unified, multichannel Digital Customer Experiences across multiple touchpoints including, web and mobile experiences for customer transactions and mobile applications.

Read this report to understand how IBM's Digital Experience software is delivering solutions for the emerging Digital Customer Experience platform and integrating best-of-breed components into software offerings that manage multiple facets of the Digital Customer Experience.

Digital reinvention Preparing for a very different tomorrow [ Source: IBM ]

July 2014- The newest digital technologies - among them social media, mobility, analytics and cloud - keep changing how people, businesses and governments interact. These digital forces enable unprecedented levels of connectedness and so the world is already investing in consumer-centricity. However, these new technologies are truly still in their infancies. The transformation that is already underway will soon intensify, resulting in a paradigm shift from customer-centricity toward an everyone-to-everyone (E2E) economy.

The implication ...

Next 25