- Gartner Report: Selecting the Best Platform for Cloud Service Integration
- How Are Banks Fighting the War on Fraud Whitepaper
- Next-Generation Network Security: A Buyers' Guide
- Five New Laws of Anti-malware Protection: Keep Up with Evolving Threats
- Case Study: Everbridge Manages Traffic and Security across Global Cloud Providers and Local Data Centers
Software-defined security (SDSec) is an architectural approach to security and compliance that implements controls in a manner that abstracts them from physically-oriented elements such as topology, hardware, or physical location.
This paper summarizes the five architectural principles of SDSec and the ways in which CloudPassage has implemented them by building the Halo SDSec platform for cloud infrastructure.
March 2015- The hot topic in the information security industry these days is Advanced Threat Defense? (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it's the science and the art of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses. We like to define advanced threat defense in terms of the adversary rather than the attack technique used to remind ...
March 2015- Advanced Persistent Threats (APTs) in the online realm are a painful reality for companies of all sizes, from the largest enterprises down to small and medium-sized businesses (SMBs). Business leaders might be tempted to think that their own organizations are exempt from APTs, or that the security measures they already have in place are adequate to defend against these persistent, methodical attacks. Yet those temptations must be avoided. If your business has something of value ...
March 2015- Read this case study to learn from a company who suspected that suspicious activity was occurring on their network. After determining they were likely the victim of a network breach, they were not sure how the breach occurred or what, if anything, had been taken. With more than 1600 servers and approximately 6000 user devices, there was a need to prioritize forensic evidence as they worked to determine affected infrastructure. Download this paper to find out how ...
January 2015- Federal agencies are awash in data, and the personnel and equipment costs associated with data management are rising, along with the legal and regulatory risks. In this Q&A, James C. Bejoian, a leading information management expert, weighs in on how agencies can better manage and control exploding volumes of data.
October 2014- Digitization and document storage services give federal agencies the help they need to manage the flood of information today -- and in the future.
December 2014- Explore this guidebook to learn how to automate business processes and benefit from Salesforce application integration, get tips for using iPaaS to better connect the data that runs your business and get checklists to help you benefit from Salesforce integration -- whether you're using in-house integration resources or consultants.
June 2014- Application and data integration doesn't have to be slow and expensive. Read this informative research report to learn how cloud-managed integration delivers 2.5 times faster time-to-value, offers nearly 40% lower total-cost-of-ownership (TCO) and speeds results for organization such as AAA, Brady and Panasas.
March 2015- Many enterprises worry about the security of their information in the cloud. Yet the many different paths employees take to access that data may be anything but secure. This in-depth guide explains the cloud connection security challenges — and what to do about them.
August 2014- If we are to progress towards more secure and convenient authentication solutions, we have to start thinking beyond passwords. Multi-factor solutions that operate independent of passwords, are the future. But not all users are created equal. Some need more stringent forms of authentication than others. So who are you trying to protect?
November 2013- How many help desks do you have in your business right now? How many IT service management tools, or versions of the same business application is your organization using right now? If the answer to any of these is greater than one, your organization may be operating with a handicap that hinders agility, responsiveness and competitive success. Read this paper to learn more.
February 2015- You know more than anyone that managing the IT service desk is a challenging job—and one that's getting more demanding by the day. New devices and apps, mobility, distributed networks and an increasingly IT-savvy user-base all add to the pressure on your processes and budgets. Because of this, IT is now faced with a growing inability to service the demand that users are generating, and lack efficient ways to keep pace. But there's ...
March 2015- Laptops, and now the plethora of mobile devices -- has left enterprises scrambling to properly control access to their resources. SecureAuth IdP's device fingerprinting delivers the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users. Read on to learn more.
October 2014- CIOs want harmony. Security directors loathe point products. Network operations won't buy into anything new. CIOs can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on premises with a new cloud component. Read the white paper to learn more.
May 2014- Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale and performance. Leveraging the power of an Application Delivery Controller allows enterprises to efficiently deploy a next-generation IPS infrastructure. Read this white paper to learn how installing the right solution allows the IPS to focus on identifying and mitigating threats to the network, and ensure that no application is left unprotected.
March 2015- SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. The stakes around SSL have been upleveled to the limit. Whether or not it's convenient to admit, it's time for organizations to uplevel their overall security posture to protect this last line of defense. Read this white paper to learn how your organization can properly embrace a higher ...
December 2013- The world of enterprise security is changing and being driven by mobility, cloud applications and social media. The disappearing corporate perimeter has made it easier to breach security as employees access corporate assets over unprotected networks. The level of protection needed cannot be achieved with traditional appliance-based security and hybrid solutions. This whitepaper talks about a new approach needed in today's complex IT environments that gives CISOs visibility into every user and device accessing the ...
December 2013- The world of IT security is undergoing tremendous change as the corporate perimeter disappears and employees are increasingly mobile. These always-on, connected employees become a point of vulnerability as they access the corporate network through unprotected Wi-Fi. This white paper talks about a new approach needed in order to protect the network from Internet security threats. It also highlights how Zscaler's Security-as-a-Service platform, built from the ground up and 100% cloud, protects organizations and employees irrespective ...
December 2014- APT attacks have led to breaches at very high visibility targets like financial institutions, government agencies and high tech companies. A new approach to defense is needed as security appliances and hybrid solutions are limited in protecting organizations and employees in today's social, mobile world. This whitepaper explores a uniquely differentiated approach to combating the four stages of an Advanced Persistent Threat (APT) attack lifecycle - Reconnaissance, Initial Infection, Control, Exfiltration. Zscaler's comprehensive new approach ...
September 2014- How does a solid state drive compare with a hard disk drive? Take a look at this free infographic to see how SSDs provide better performance, reliability, power usage, and savings when compared to HDDs.
March 2015- Automation is essential to success in the emerging era of cloud and Big Data, whether for public, private, internal, external, or hybrid IT environments. With respect to cloud, EMA research has revealed that the use of automation and orchestration is strongly correlated with overall project success. As Big Data projects become more prevalent and ever larger, automation will be essential to capturing the promise they hold. The challenge has been finding a practical and effective ...
February 2015- What is Warehouse-grade automation? It's automation specifically designed for Warehouse-grade or Web-scale enterprise and service provider datacenters deploying Big Data and private cloud infrastructure such as Hadoop, NoSQL, OpenStack, and much more. This white paper discusses the new realities and challenges faced by enterprise datacenters, and table stakes for a complete Warehouse-grade automation platform.
March 2015- Migrate Without Pain: Replace Your Aging LDAP Infrastructure While Supporting Legacy Applications
March 2015- Download this paper and learn:
- How the industrialization of hacking and modern, extended networks are changing security dynamics
- Why a threat-centric security model addresses security professionals' most pressing issues
- How to increase security effectiveness before, during and after an attack
- Why technologies that are visibility drive, threat focused and platform based are essential
March 2015- Data center administrators face a significant challenge. They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address. Ready to learn more?
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services