Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......

Evaluating Managed File Transfer in the Cloud: What You Need to Know [ Source: Ipswitch File Transfer ]
December 2012-
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs of each. And this decision does not need to be "either-or"; for many companies an enterprise solution for managing secure file transfer encompasses both cloud hosted and on-premise options.
This white paper from Osterman Research details advantages to consider for managing file transfer operations in the cloud, and ...
A New Breed of Information Security Leader: The Hyper-Connected Era and What It Means for CIOs and CISOs [ Source: IBM ]
December 2012- 2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?
Close Encounters of the Third Kind [ Source: IBM ]
December 2012- This white paper presents the results of a research study on the prevalence of client-side JavaScript vulnerabilities, conducted by the IBM Security (formerly, IBM Rational) application security team. For this study, the researchers used IBM JavaScript Security Analyzer (JSA) technology, which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. This kind of analysis is superior to and more accurate than regular static ...
Your Organization Has Just Been Attacked by Malware - Now What? [ Source: Sourcefire ]
December 2012-
Jumping the gun? Maybe. But odds are it will happen.
Be ready with your Advanced Malware Survival Kit.
Download our Incident Response Brief: 4 keys to effective malware response
From there, access:
• Videos: See the power of malware visibility and control from the network to end-devices
• Special Offer: 100 Free Seats of advanced malware protection
Download the Advanced Malware Survival Kit Now and be prepared before the next attack!
3 Strategies to Protect Endpoints from Risky Applications [ Source: Dell KACE™ ]
November 2012- Cyber criminals have started to look for greener pastures—namely among third-party applications. Reduce the risk profile of PC and server operating systems and protect endpoint security from risky applications. Read the white paper today.
The Quest for a Cloud Integration Strategy [ Source: Dell Boomi ]
October 2012-
Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high costs of purchasing and implementing integration solutions.
Fortunately, the development of SaaS applications has leveled the playing field in terms of affordability but it has also changed the integration game significantly, due to the unique characteristics of the model itself.
SaaS applications are very cost effective, until their data is needed elsewhere ...
Bloor Research: The Economics of Cloud Managed Integration [ Source: Dell Boomi ]
November 2012-
Application and data integration doesn't have to be slow and expensive. New cloud-based integration platforms dramatically speed results and lower costs, as outlined in this new report by Bloor Research. In this paper, you'll learn how Cloud Managed Integration:
• delivers 2.5 times faster time-to-value
• has nearly 40% lower total-cost-of-ownership (TCO)
• is speeding results at AAA, Brady and Panasas
Three Steps to Mitigate Mobile Security Risks [ Source: Rapid7 ]
November 2012-
Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices present to their corporate data.
This white paper highlights key mobile security risks and describes how pervasive they are based on data from ...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance [ Source: Rapid7 ]
November 2012-
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance.
When you download this free eBook, ...
EMA™ Radar for Hybrid Cloud
Integration Technologies
[ Source: Dell Boomi ]
November 2012-
In this EMA Radar Report, Enterprise Management Associates evaluates seven of the leading vendors of cloud integration platforms, for the value they offer organizations in cloud to cloud, cloud to on-premise and on-premise to on-premise application integration use cases.
Evaluations were conducted according to extensive criteria in Functionality, Deployment and Administration, Architecture and Integration, Cost Advantage, and Vendor Strength, giving prospective customers a wide-ranging view of leaders in this market.
Bring Your Own Device Policy Consideration [ Source: Good Technology ]
November 2012-
The increased use of personal iOS and Android devices in your workplace isn't a threat - it's an opportunity. When your employees use their own smart phones and tablets for work activities, they're likely to be happier and more productive. And your company can save money in the long run.
By putting the right usage policies and security technology in place, you can ensure your sensitive corporate data stays safe in transit and ...
Nemertes Research: Mobile Security Challenge Emerges [ Source: Blue Coat ]
October 2012- This report examines the security challenges and requirements for the hybrid fixed and mobile workplace of today and demonstrates how the mix of on-premise and cloud applications in the enterprise needs an array of security solutions directed by a flexible security policy that follows the user, regardless of device or location.
Intel Cloud SSO - Platform Security [ Source: McAfee ]
October 2012-
Identity as a service is emerging as a new, innovative approach to identity and access management (IAM) in the cloud that brings with it the potential to reduce costs, enhance end-user and IT administrator productivity, and enable greater enterprise agility.
One of the biggest concerns expressed by IT managers about outsourcing their IAM operations to a cloud-based service provider is security. When user credentials (e.g., user ID, password, and other attributes) are ...
Cloud Identity Buyer's Guide [ Source: McAfee ]
October 2012- The software-as-a-service (SaaS) application delivery model is growing rapidly. However, customers who adopt the SaaS model struggle to manage the overwhelming number of user accounts they have to create. Their users are constantly forgetting their passwords and calling the help desk. They are unhappy because they have to reenter their user ID and password every time they logon to an application during the day. Overwhelmed IT administrators take too long to create accounts for new ...
Intelligent Authentication and User Access: Balancing Security and Convenience [ Source: CA Technologies ]
October 2012- With online applications and services driving the market - and providing a key competitive differentiator - organizations are under mounting pressure to remain agile and accelerate the delivery of web-enabled capabilities. But at the same time, they must ensure that new online offerings are supported by security measures capable of effectively protecting personal information - plus critical business data - without impeding the user experience.
Enterprise-class API Patterns for Cloud & Mobile [ Source: Intel ]
October 2012-
Dan Woods, Chief Analyst CITO Research, outlines enterprise architecture requirements for designing, managing, and protecting APIs and how the emerging API Gateway "proxy" deployment model is speeding deployment across industries.
In this model, authentication using OAuth and other lightweight protocols such as REST and JSON are all the rage but Enterprise-class security is still lacking. To present actionable solutions, Dan presents 5 core API patterns for mobile, partner, data control, and PaaS infrastructure with ...
A Unified Mobile Architecture for the Modern Data Center [ Source: Intel ]
October 2012-
This technical white paper is designed for security architects, app developers, and program managers that are chartered to rapidly repurpose and expose enterprise application services for app store and mobile consumption. We present how to develop/deploy a server side architecture to enable the mobile application economy via REST APIs with JSON, contrast native vs web based client architectures, and the resulting impacts on security, protocol mediation, and data control.
We posit how ...
Security Gateway Buyer's Guide [ Source: Intel ]
October 2012- This buyer's guide, written by independent industry security expert, Gunnar Peterson, will provide the analysis and decision support that will enable you to make an informed choice. Learn about Security Gateway architectural capabilities and common business use cases where they are deployed.
Global Threat Report: September 2012 [ Source: ESET ]
October 2012- Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
Securing the Cloud [ Source: F5 ]
October 2012- Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add to this array of concerns the potential loss of control over your data, and the cloud model starts to get a little scary. ...
The 5 Key Benefits of Application Control and How to Achieve Them [ Source: Sourcefire ]
September 2012-
Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks.
How do you encourage productivity and minimize risks?
Application control is key.
Read "The Five Key Benefits of Application Control and How to Achieve Them," ...
Gaining Security Intelligence Splunk App for Enterprise Security [ Source: Splunk ]
September 2012-
Learn how security professionals are extending the use of Splunk with the Splunk App for Enterprise Security. This document describes how you can take full advantage of Splunk's analytics and visualization capabilities and unique ability to process big data.
With the ability to search and process known and unknown threats, you can use Splunk as your primary security data interface. Splunk and the App for Enterprise Security are equally suitable for a small ...
Whitepaper: Cloud Security Myths and Strategies Uncovered [ Source: VMware ]
September 2012- Forward-thinking CSOs are embracing the right security strategy and exercising appropriate caution without dampening cloud optimism. By overcoming the number one perceived challenge security-CIOs-can move beyond their fears to pursue their IT transformation to cloud computing.
Vulnerability Shielding: The Patch Management Challenge [ Source: Trend Micro ]
September 2012-
Each year thousands of critical software flaw vulnerabilities are reported in operating systems, databases, servers, and other applications. Patching these vulnerabilities can be disruptive and time consuming, requiring systems to be rebooted and impacting service level agreements. Even when a patch is available, it can take weeks or even months before the patch can be fully deployed.
Download "Vulnerability Shielding: The Patch Management Challenge" to learn about some of the key features and ...
How to Protect Your Hybrid Cloud [ Source: Trend Micro ]
September 2012-
Security for hybrid clouds must span both the private and public cloud infrastructures. To keep data and applications safe throughout the hybrid cloud, you'll need self-defending VMs using agent-less security for the private cloud as well as agent-based security for the public cloud.
Download "Total Cloud Protection: Securing Your Unique Cloud Journey" to find out how you can leverage a hybrid solution that allows you to:
• Control when and where data ...
Guide to Evaluating Multi-Factor Authentication Solutions [ Source: PhoneFactor ]
October 2012-
Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user's password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication is no longer optional for many organizations.
Whether you're planning to implement multi-factor authentication for the first time or are looking to expand ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite
