The cyber security threat landscape is constantly evolving. The tools, behaviours and techniques of those attacking and defending organisations are constantly adapting to each other.
While high-profile attacks now regularly appear in the press, many decision makers are left wondering what steps they can actively take to stay on top of a threat which is forever changing.
In our report Cyber threat landscape: Guide for business leaders we outline five cyber ...
March 2014- Organizations that have not developed an effective mobile empowerment and management strategy risk falling behind their more mobile-enabled competitors. Every organization today should have a viable mobile strategy that maximizes its market advantage while addressing the management and security challenges of a mobile-enabled workforce. An essential component of such a strategy is investing carefully in effective mobile management and security tools, as well as in the deployment model that brings the most benefit with the ...
March 2014- Comparing next-generation firewalls can be a daunting task. Although next-generation firewalls (NGFW) are a hot topic, many vendors vary in their description of exactly what constitutes an NGFW. Essentially it's about moving beyond basic ports and protocols to inspecting data at a deeper level to control users and applications. So how do you compare next-gen firewall and UTM solution providers like Sophos, WatchGuard, SonicWALL, Fortinet and Check Point? Download this buyers guide and find out!<...
Remote and roaming workers are constantly checking email, downloading data, and staying productive. Results are their top priority-security is not. IT organizations need to keep up with these high-performers to update their security software and scan their systems for viruses without reducing their productivity.
So how can you empower remote and roaming employees with the tools they need, while still protecting your computing resources and proprietary data-without busting the budget or hiring an ...
Full-disk encryption is rapidly becoming a standard security solution, like antivirus or spam filters-a trend further accelerated by widespread use of Microsoft BitLocker. However, to support the flexibility of your workers today, full-disk encryption is not enough to prevent data loss. Your users are no longer confined to the office by their technology and their PCs, and work has become a thing people do rather than a place they go to.
This whitepaper ...
The threat landscape is changing, or is it?
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years-social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones.
Virtualization promises to reduce operational costs, simplify management and increase availability of servers and virtual desktops. But how do you protect virtual machines from malware without compromising the performance and convenience that you expect from your investment in virtualization?
This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments: agentless scanning using vShield Endpoint and client-based scanning optimized for virtual ...
It takes more than antivirus to stop today's advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming.
Download this endpoint buyer's guide and read independent research and test results that will help you determine your endpoint security solution requirements and identify the vendor that best meets your needs
When an organization has been compromised, some of the first questions to ask are critical:
•Which systems can I trust?
•What was done to compromise my systems or data?
•How quickly can I figure out where I stand?
Tripwire is often called in after the fact to help answer these questions, even if the breached organization was not monitoring their systems with Tripwire technology. The following ...
May 2012- Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized, and only providing value around audit time. How useful is a 100-page vulnerability report to an operations person trying to figure out what to fix next? But the tide is definitely turning?there is now a clear shift from a largely compliance-driven orientation to a more security-centric view. It?s widely acknowledged that compliance provides a low bar for security, and it just ...
March 2014- Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by all levels of an organization. The challenge of how to measure, and therefore how to manage, risk is ever-present and top of mind for information security professionals. Unfortunately, most of the tools for vulnerability and risk management that exist today do not provide a suitable metric and consequently do not improve an ...
Most organizations understand the critical role that vulnerability management (VM) plays in helping them meet compliance requirements,ensure security and reduce risk. However, many organizations discover,only after investing in a solution, that it doesn't properly address their needs. Avoiding this costly mistake can be difficult though, because at first glance many VM solutions appear similar.
This guide helps you objectively choose a new or replacement VM solution by teasing out the real ...
March 2014- With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities. Here are the Lumension-recommended steps to cure your patch management headache.
March 2014- Last year we offered our thoughts on buying Endpoint Security Management offerings - including patching, configuration, device control, and file integrity monitoring - which are increasingly bundled in suites to simplify management. In this updated and revised 2014 Endpoint Security Buyer's Guide we update our research on the management functions described last year and add coverage of antimalware, mobility, and BYOD. All very timely and relevant topics. The goal of this guide remains to provide clear ...
March 2014- True North advisors wanted a file sharing solution which was simple and had enterprise grade security. After finding multiple security holes in Box and Dropbox they chose Egnyte as it provided superior security controls and deployment flexibility.
March 2014- Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence-driven techniques to redefine fraud risk.
March 2014- In its latest Executive Brief, security industry analyst Frost & Sullivan examines why any organization can be a target, and how robust authentication from leading global vendor RSA is a proven strategy for reducing your vulnerability. RSA's breadth of form factors - including Risk-Based Authentication - is just one aspect that sets RSA solutions apart. The insightful content focuses on: Why even secure passwords aren't enough, what makes an organization a target, four key areas that ...
March 2014- Making the Case for Strong Authentication - in this paper, RSA examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.
March 2014- This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.
March 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Competitive advantage is derived by an organization when it develops strategies, techniques, or resources that allow it to outperform its competition. One such resource is the innovative use of analytics to improve business decisions or operational processes. Decision makers can use analytics to cultivate the data collected from day-to-day operations into key insights unavailable to the competition.
The field of predictive analytics is the next evolution in business intelligence - moving beyond the ...
February 2014- DNS has become a key part of enterprise networks and is used constantly to perform business-critical functions. Unfortunately, it has been largely overlooked in efforts to protect IT infrastructures and is increasingly targeted by hackers. A comprehensive solution is now available to protect against both types of attacks that exploit DNS-attacks from outside aimed at bringing the network down, and attempts by malware planted on internal servers to exfiltrate sensitive information. Read this white paper ...
February 2014- Stories about devastating cyberattacks are plaguing the news every week. You might be thinking your network is secure. You have a sophisticated, layered, defense-in-depth strategy in place. Your customer data-and your business reputation-are undoubtedly secure, but is it? Take a look at yourself through the eyes of the cybercriminals who are making today's headlines. They know that there is a hole in most defenses and how to exploit it. Carrying out a DNS attack is ...
You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Don't get caught in the crossfire. Read our special report "Who's spying on you?" to find out more:
• Techniques cybercriminals use
• Common exploited vulnerabilities
• Collateral damage from cyberespionage
• Protecting your business ...
February 2014- This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you'll find out all about AETs, and get ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services