Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......

Dennis Technology Labs - Effectiveness in Virtual Environments [ Source: Symantec ]
October 2012- This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.
Cybersecurity in Action [ Source: Guidance Software ]
October 2012-
4 Days, 465 Systems, 3 continents
The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.
Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...
Achieving Compliance in Digital Investigations [ Source: Guidance Software ]
October 2012-
80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.
This ...
How Three Cyber Threats Transform the Role of Incident Response [ Source: Guidance Software ]
October 2012-
“The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System
While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage ...
Finding An Effective Antivirus Solution To Please Users & Administrators [ Source: ESET ]
October 2012- Does your anti-virus bring your systems to a crawl? Is it causing administrators to pull their hair out? This whitepaper shows you how to solve both problems with one product!
Options for Backing Up Your Computer [ Source: ESET ]
July 2012- While personal computers range in cost from a few hundred to a few thousand dollars, a computer is a physical object, and it can be replaced. What really makes your computer valuable is what's unique about it, and that is your data - your business records, pictures, audio and video recordings, and documents you have saved over the years. Read to learn more about how to keep your data safe.
Keeping Secrets: Good Password Practice [ Source: ESET ]
July 2012- Alternative and supplementary forms of authentication have become far more common (and affordable), but the humble password remains the somewhat crumbling gatehouse to many a security structure. Learn how to tighten the weakest link of your security system.
Ten Ways To Dodge CyberBullets: Reloaded [ Source: ESET ]
July 2012- In the frequently changing threat landscape, as cyber-criminals and security companies constantly introduce new techniques and countermeasures, the basic principles of self-defense stay the same, so even while detail changes, the underlying advice remains critical to protection.
Trends for 2012: Malware Goes Mobile [ Source: ESET ]
July 2012- The ways in which people are accustomed to using technology have always influenced and determined malware development and that trend will continue. With the significant growth in the use of mobile devices, malware developers have been working to make these platforms a viable entry point for malicious code infection.
The 5 New Laws of Anti-Malware [ Source: Sourcefire ]
July 2012-
Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.
If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.
Current research suggests as much as 75% of new viruses are ...
Top 5: The Largest Malware Delivery Networks [ Source: Blue Coat ]
November 2011-
The Blue Coat 2011 Mid-Year Security Report described the powerful tools that make malware delivery networks successful: dynamic web links that enable cybercrime to change out payload servers and avoid detection. Last year, the malware web delivery infrastructure was hacking into popular and trusted domains where cybercriminals can display lures beyond the reach of reputation filters and web category blocking.
With an eye on acceptable-use policies, the lures often inhabit categories such as Online ...
Integrating the CorreLog Security Correlation Server with McAfee ePolicy Orchestrator (ePO) [ Source: CorreLog ]
October 2011- This white paper provides a detailed discussion of objectives and methodologies for integrating CorreLog software with McAfee ePolicy Orchestrator (ePO) software. This document also describes the features and capabilities of the implementation, intended as a top-level description of how to add CorreLog's Security Information and Event Management (SIEM) functions with the ePO software system, to create a single unified system.
Email Security in Small and Medium-Sized Businesses [ Source: GFI Software ]
July 2011- No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without.
See, Analyze and Fix all of Your Endpoints [ Source: Promisec ]
January 2011-
Findings of an inspection of over 100,000 endpoints across multiple enterprises confirmed some type of breaches in security and compliance. Typically, 10-35% of endpoints demonstrated some kind of security threat or compliance issue. The most notable findings of the 2010 study were a dramatic rise in unmanaged machines and miss-configured anti-virus software and other third-party agents.
The 10 Scariest Web Threats and How to Eliminate Them [ Source: MessageLabs, Symantec Hosted Services ]
September 2010- This white paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Managers everywhere must also find a balance between allowing reasonable personal internet use at work and maintaining productivity and concentration in the office.
Targeted Trojans: The Silent Danger of a Clever Malware [ Source: MessageLabs, Symantec Hosted Services ]
September 2010- This white paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans. Finally, this paper will look at the Symantec Hosted Services MessageLabs™ Complete Email Guard solution and how Symantec Hosted Services can help protect an organization against targeted Trojans in the future.
Gartner Magic Quadrant for Secure Email Gateway [ Source: MessageLabs, Symantec Hosted Services ]
September 2010- This industry report covers the email gateway market. Gartner, Inc. positions Symantec in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). In this report, Gartner analysts note that, "The e-mail security market is very mature. Targeted phishing detection, outbound e-mail inspection, encryption and delivery form factor are the major differentiators." Please enter your contact information to view the complete Gartner Magic Quadrant for ...
Understanding the Value of Managed Security UTM Solutions [ Source: MegaPath ]
April 2010- Couple the reality of IT staff resources stretched too thin with security threats that are increasingly sophisticated and destructive, and the corporate trend -- even at the low-end of SMB businesses -- toward relying on an experienced managed security services provider becomes clear. This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions.
Not All Malware Detection Is Created Equal [ Source: Sophos ]
November 2009- The internet is now the number-one conduit for infecting users with malware. SophosLabs reports that in 2009, 23,500 new infected web pages are discovered every day. That’s one every four seconds or so, four times worse than what it was in the same period in 2008 [1]. Malware authors are very successful with a popular method: compromising popular, high-traffic, legitimate sites in order to kick-start the infection process. Users visiting a hijacked site have no way of knowing ...
Comparing Google Message Security And Leading Messaging Security Solutions [ Source: Google ]
February 2008- This white paper presents market research from a survey of organizations that are using Google Apps Security and Compliance Solutions, as well as solutions offered by nine other leading vendors. The goal of this research was to determine how organizational decision-makers perceive the offerings with which they are most familiar, and to determine if there are quantifiable differences between Google’s solutions and those offered by the other vendors. The research found that with Google ...
The Case For Third-Party Archiving In Microsoft Exchange Server 2010 [ Source: Google ]
November 2009- The archiving capabilities in Exchange 2010 are a good start, but they are more or less a first-generation offering that will not satisfy the needs of many organizations, particularly those in mixed environments. As a result, most organizations will still need the varied capabilities provided in third-party archiving solutions that will support Exchange 2010 and earlier versions of Exchange, as well as other mail and collaboration systems. This white paper has three primary goals: educate decision-makers about ...
Employee Web Use and Misuse: Companies, Their Employees and the Internet [ Source: MessageLabs, Symantec Hosted Services ]
November 2009- The Internet has created new opportunities for mischief and new challenges for managers. In the end, it comes down to choice. Where do you draw the line? How do you balance individual access with the overall protection and good of the business? What is the correct balance between monitoring and blocking? This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring ...
A Guide to Email Regulatory Compliance [ Source: Perimeter ]
August 2009- Laws have been passed to more adequately secure private and sensitive information, many of them specifically requiring better email security. Secure your information exchange by acting on the essential tips provided in this whitepaper.
Enabling a Safer Internet: The Positive Approach to Web Security [ Source: Sophos ]
November 2009- With one new infected webpage discovered every 4.5 seconds, it is essential you have the three pillars of protection - revealed in this whitepaper - to defend your organization against the sophisticated web threats of today.
Buyers' Guide to Endpoint Protection Platforms [ Source: Sophos ]
November 2009- Discover how you can leverage endpoint security and data protection to provide simplified cross-platform security, centralized management, and control of devices, apps, and network access.
Protecting Your Network Against the Growing Danger of Web Attacks [ Source: MessageLabs, Symantec Hosted Services ]
December 2010-
Web-borne malware is now more common than malware that enters an organization through email. The number of Web sites discovered per day, that carry malware increased 400% in 2008. This drastic increase in infected sites can cause serious issues for your business. Organizations need to proactively protect their networks both by instituting acceptable usage policies for employee web usage as well as implementing a solution to combat these malware intrusions.
This report ...[WHITE PAPER]
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite
