Sort results by: Published date | Company name

Endpoint Security and the iPad [ Source: Solutionary ]
April 2012- The iPad is essentially a laptop, with many of the same security concerns as any other computing device. This white paper examines endpoint security and the iPad from both its internal security protections, as well as some of the overall security concerns.

[WHITE PAPER]
Read Abstract | Go to White Paper

DDoS for Dummies [ Source: Corero ]
October 2012- A Distributed Denial of Service (DDoS) attack against your organization’s network and systems can bring your online business to a grinding halt, costing you hundreds of thousands – even millions – of dollars, ruining your brand, and driving away your customers.

Far too many organizations are ill-prepared to deal with the effects of DDoS attacks and other Internet security threats. They rely on traditional security devices including firewalls, intrusion prevention systems (IPS) and other ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work [ Source: AccelOps, Inc. ]
November 2012- The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Whether referring to security event management, security information management, log management systems, or more modern combined industry solutions, SIEM user requirements and operational considerations have evolved.

This eBook provides guidance to operationalize security and put the top 10 best SIEM practices to work, offering pertinent insights and details about how to ...

[WHITE PAPER]
Read Abstract | Go to White Paper

IBM Endpoint Manager: Reaping the Benefits of a Unified Approach to Security and IT Operations Management [ Source: IBM ]
June 2012- In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Establishing a Data-Centric Approach to Encryption [ Source: Voltage Security ]
April 2012- Many data breaches occur at companies that already have a data security policy in place. What is the problem? Typically, intrusion detection and other technologies designed to keep intruders out of your system are built to protect against previously known hacking strategies. This approach exposes your IT systems to great risk as new methods of intrusion are constantly being devised. Learn how to protect corporate data with a data-centric encryption strategy.

[WHITE PAPER]
Read Abstract | Go to White Paper

Protecting Against Advanced Malware and Targeted APT Attacks [ Source: FireEye ]
February 2012- Regain the upper hand on advanced targeted attacks. Learn how in a compelling new brief featuring Gartner research.

The cyber criminals are winning.

Today, more than 95 percent of businesses unknowingly host compromised endpoints. This is a direct result of advanced targeted attacks easily circumventing traditional IT security defenses - which can lead to theft of customer data, loss of valuable intellectual property, and irreparable damage to your brand. Discover what every ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Best Practice Log Management: Correlation is Key [ Source: CorreLog ]
October 2011- Today, collecting email data is a necessity for compliance standards, forensic analysis and managing end-user performance and availability. But making sense of the data is a challenge within itself. Collecting the data is only part of the equation and research and many shops are turning towards correlation which helps bring meaning to the massive amount of data collected. This white paper explains how to establish a systematic approach to identifying relationships (correlating!) between log data ...

[WHITE PAPER]
Read Abstract | Go to White Paper

PCI DSS Compliance Demystified [ Source: Dell ]
June 2011- All companies that process, transmit or store credit card data must comply with PCI DSS v2.0. This white paper highlights the 12 requirements of PCI DSS and explains how one solution addresses all 12 requirements.

Discover how to implement effective controls to protect cardholder information and demonstrate provable compliance with one easy step.

[WHITE PAPER]
Read Abstract | Go to White Paper

Auditing Software Acts Like A Server Security Camera [ Source: ObserveIT ]
January 2010- ObserveIT auditing software acts like a security camera on your servers. It provides bulletproof video evidence of user sessions, significantly shortening investigation time. Every action performed by remote vendors, developers, sysadmins, business users or privileged users is recorded. Video recordings include mouse click, app usage and keystrokes. Each time a security event is unclear, simply replay the video, just as if you were looking over the user’s shoulder.

ObserveIT is the perfect ...

[WHITE PAPER]
Read Abstract | Go to White Paper

PCI-Compliant Cloud Reference Architecture authored by Cisco, Coalfire, HyTrust, Savvis and VMware [ Source: HyTrust, Inc. ]
November 2010-  Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS). Innovative technologies from Cisco, VMware, and HyTrust are used to implement the cloud architecture with a number of additional security controls to meet the intent of PCI DSS. The reference architecture was implemented in the Savvis lab and the team collaborated with Coalfire, which ...

[WHITE PAPER]
Read Abstract | Go to White Paper