Sort results by: Published date | Company name

IBM Endpoint Manager: Reaping the Benefits of a Unified Approach to Security and IT Operations Management [ Source: IBM ]
June 2012- In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Mobile Device Management Glossary [ Source: Fiberlink ]
May 2012- The team at MaaS360 talk to prospects and customers about Mobile Device Management (MDM) every day. It has been noticed that there are a number of people looking for basic information regarding MDM. To help the community, this document has been prepared to contain a glossary of important mobile device management terms. Examples include ActiveSync, APNS, SCEP and OTA Configuration.

[WHITE PAPER]
Read Abstract | Go to White Paper

Establishing a Data-Centric Approach to Encryption [ Source: Voltage Security ]
April 2012- Many data breaches occur at companies that already have a data security policy in place. What is the problem? Typically, intrusion detection and other technologies designed to keep intruders out of your system are built to protect against previously known hacking strategies. This approach exposes your IT systems to great risk as new methods of intrusion are constantly being devised. Learn how to protect corporate data with a data-centric encryption strategy.

[WHITE PAPER]
Read Abstract | Go to White Paper

Protecting Against Advanced Malware and Targeted APT Attacks [ Source: FireEye ]
February 2012- Regain the upper hand on advanced targeted attacks. Learn how in a compelling new brief featuring Gartner research.

The cyber criminals are winning.

Today, more than 95 percent of businesses unknowingly host compromised endpoints. This is a direct result of advanced targeted attacks easily circumventing traditional IT security defenses - which can lead to theft of customer data, loss of valuable intellectual property, and irreparable damage to your brand. Discover what every ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Smartphone And Tablet Management: Best Practices Guide [ Source: Fiberlink ]
September 2011- More businesses than ever are confronting how to fully embrace mobile devices beyond their executive and sales teams. In a way, IT teams are being dragged into this. Many users have fully incorporated smartphones and tablets into their daily lives and use corporate-issued and personally-owned iPhones, iPads, and Android devices to access corporate data. They have also adopted application stores in their personal lives, blending activities like web browsing, games, and mobile payments with business ...

[WHITE PAPER]
Read Abstract | Go to White Paper

PCI DSS Compliance Demystified [ Source: Dell ]
June 2011- All companies that process, transmit or store credit card data must comply with PCI DSS v2.0. This white paper highlights the 12 requirements of PCI DSS and explains how one solution addresses all 12 requirements.

Discover how to implement effective controls to protect cardholder information and demonstrate provable compliance with one easy step.

[WHITE PAPER]
Read Abstract | Go to White Paper

Auditing Software Acts Like A Server Security Camera [ Source: ObserveIT ]
January 2010- ObserveIT auditing software acts like a security camera on your servers. It provides bulletproof video evidence of user sessions, significantly shortening investigation time. Every action performed by remote vendors, developers, sysadmins, business users or privileged users is recorded. Video recordings include mouse click, app usage and keystrokes. Each time a security event is unclear, simply replay the video, just as if you were looking over the user’s shoulder.

ObserveIT is the perfect ...

[WHITE PAPER]
Read Abstract | Go to White Paper

PCI-Compliant Cloud Reference Architecture authored by Cisco, Coalfire, HyTrust, Savvis and VMware [ Source: HyTrust, Inc. ]
November 2010-  Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS). Innovative technologies from Cisco, VMware, and HyTrust are used to implement the cloud architecture with a number of additional security controls to meet the intent of PCI DSS. The reference architecture was implemented in the Savvis lab and the team collaborated with Coalfire, which ...

[WHITE PAPER]
Read Abstract | Go to White Paper

nCircle Solutions for Automating the Consensus Audit Guidelines Critical Security Controls [ Source: nCircle ]
November 2010- Securing our federal infrastructure has become one of our nation’s top cyber security priorities. The Consensus Audit Guidelines (CAG) were created to begin the process of establishing a prioritized baseline of information security measures and controls for the Federal Government. Fifteen of the twenty security controls outlined in CAG can be monitored, at least in part, automatically and continuously.

The rapid rate of change present in an environment constantly under attack makes ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Unraveling Web Malware [ Source: FireEye ]
September 2009- There has been a rapid rise in the use of web blended threats to exploit client browsers and operating systems. These can lead to infection by bots which can be controlled remotely. Eleven percent of the world’s computers are enmeshed in at least one botnet and 72% of corporate networks with more than 100 computers have an infection.

Obfuscated code and encrypted exploits are increasing in prevalence. The point of these exploits is to ...

[WHITE PAPER]
Read Abstract | Go to White Paper