Secure the Enterprise with Confidence
The explosive increase in cyberthreats poses an increasingly daunting challenge to the confidentiality, integrity, and availability of intellectual property and other sensitive information. Conflicting opinions ......
July 2012- SCADA (Supervisory Control and Data Acquisition) describes computerized industrial control systems that monitor and control industrial and infrastructure processes. With recent attacks, manufacturers, utilities and industries must now implement solutions to protect their SCADA systems. See the product sheet to learn how the Norman SCADA Protection system protects against cyber-attacks that target critical SCADA systems.
July 2012- The risks of malware analysis are easily surmountable through the use of an automated dynamic malware analysis platform such as Norman's Malware Analyzer G2 (MAG2). MAG2 provides additional benefits to analysts in their fight against a constantly growing and maturing malware threat landscape. To learn more about Norman?s Malware Analyzer G2 defense-in-depth strategy see the Norman Automated Malware Analysis Whitepaper.
It is said that the notorious gangster Willie Sutton once offered up a simple reply when asked why he robbed banks: "Because that's where the money is." In today's digital world, it is likely gangs of criminal hackers would share a similar sentiment when asked about targeting businesses.
But it's not only large enterprises that have information worth targeting - small to midsized businesses (SMBs) contain their share of valuable data as well. ...
June 2012- As different as IT and business needs might seem, in the case of identity-management and access-governance systems, you cannot meet the needs of one without meeting the needs of the other. It is imperative that both systems work together to meet and exceed business and IT objectives. While IT must support compliance efforts, provide access, keep systems secure and update technology and computing environment, business managers are concerned with staying compliant, passing security/regulatory audits, ...
As compliance demands comprehensive protection of cardholder data, enterprises require comprehensive solutions that support heterogeneous environments with a multitude of servers, operating systems, devices and applications. But getting to that point can be difficult without a good roadmap.
This whitepaper outlines a clear path to full PCI DSS compliance with a cost-effective solution.
June 2012- Despite growing protective security measures, data breaches continue to plague organizations. This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches. It also discusses file integrity monitoring as a critical component of Payment Card Industry Data Security Standard (PCI DSS) compliance, and shows how NetIQ addresses both security and compliance challenges through the NetIQ Identity ...
Hackers continuously attack Websites in order to steal sensitive data and disrupt access. To address the threat from hackers, the PCI Data Security Standard mandates that merchants fortify their Web applications against attack.
This eBook describes today's Web security risks and introduces a new cloud-based solution that protects Websites from hackers and helps meet PCI compliance requirements.
DDoS attacks, aided by off-the-shelf tool kits and simple automation techniques have become the weapon of choice for both financially-motivated cyber criminals and hyper-politicized "hacktivists." Organizations of all sizes must recognize that they are potential targets for the next massive DDoS barrage. Fortunately, there are some key counter-measures that can be employed to protect your organization.
Read this paper to understand the critical security techniques your organization needs to take in order to ...
In 2010, more than 26 million Americans, or nearly 20 percent of the U.S. workforce, worked from home or remotely for an entire day at least once a month, according to Telework 2011, a WorldatWork report. These statistics make it clear: A good chunk of our workforce has more than one office.
Download "Secure Mobility: Inside Windows 2008 DirectAccess" to understand the potential for great job satisfaction, and benefits and challenges to an increasingly remote workforce such ...
April 2012- IBM SmartCloud Notes helps to protect our customers' information through governance, tools, technology, techniques, and personnel. SmartCloud Notes is a full-featured email, calendar, contact management and instant messaging service in the IBM cloud. At IBM, we strive to implement security and privacy best practices. The SmartCloud Notes security controls provide a range of protection of e-mail while enabling business operations.
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats.
IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
"It may just seem like DDoS attacks don't exist at all." Find out why Tier1 Research gives the thumbs-up to SiteProtect - Neustar's cloud-based DDoS mitigation solution. Get a knowledgeable third party's take on the benefits of stopping attacks in the cloud, far away from key infrastructure.
Discover why T1R likes SiteProtect's cost-effectiveness, along with the flexibility its on-demand service affords. See what Tier1's expert analyst says about Neustar's 10+ years of ...
The emergence of social media as the mainstream communications environment has driven business and personal usage of many web 2.0 applications including video, email, chatting, and blogging. This creates a business imperative to allow, but control, web 2.0 applications - most significantly social media usage.
In the current complex and dynamic web environment, achieving the required control of web access starts with an accurate, dynamic and granular content filtering database. Blue Coat WebFilter content filtering, ...
Innovation breeds opportunity, even for the underground. Web and mobility innovations focus on ease of use, availability, and building large user audiences, but they breed opportunity for cybercrime. Security typically comes later, after a period of breaches and security issues put the issue front and center. Halfway through 2011, we are in the midst of this security period.
The majority of web threats are now delivered from trusted and popular web sites that have ...
This white paper outlines the limitations of traditional defense mechanisms; specifically how cybercriminals have refined the malware manufacturing and development process to systematically bypass them - thereby initiating an arms race with defenders. Security patches are found to be a primary and effective means to escape this arms race as they remediate the root cause of compromise. However, timely patching of the software portfolio of any organisation is like chasing a continually moving target.
October 2011- Today, collecting email data is a necessity for compliance standards, forensic analysis and managing end-user performance and availability. But making sense of the data is a challenge within itself. Collecting the data is only part of the equation and research and many shops are turning towards correlation which helps bring meaning to the massive amount of data collected. This white paper explains how to establish a systematic approach to identifying relationships (correlating!) between log data ...
October 2011- This white paper provides a detailed discussion of objectives and methodologies for integrating CorreLog software with McAfee ePolicy Orchestrator (ePO) software. This document also describes the features and capabilities of the implementation, intended as a top-level description of how to add CorreLog's Security Information and Event Management (SIEM) functions with the ePO software system, to create a single unified system.
As the size, frequency and complexity of distributed denial of service (DDoS) attacks increase, data center security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls and intrusion prevention systems (IPS) are inadequate when it comes to stopping today's complex, multi-faceted DDoS attacks.
Arbor Networks, a leading network security company, recently introduced the Pravail - Availability Protection System (APS) - focused specifically on securing enterprises and the ...
As the size, frequency and complexity of DDoS attacks increase, security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls or intrusion prevention systems (IPS) are inadequate when it comes to stopping today's volumetric and application-layer DDoS attacks. The solution? A layered Intelligent DDoS Mitigation System (IDMS).
This paper examines some of the latest DDoS attack trends and provides service providers with best practices for delivering layered ...
August 2011- Both Denial-of-Service (DoS) and Brute Force Attacks have existed for many years, and many network devices tout the ability to withstand them. However, most of today's DoS attacks target layer 7 (L7) by overwhelming applications with seemingly valid requests and Brute Force programs can send more than one million attempts per second. This paper will discuss how to intelligently mitigate these types of attacks.
February 2011- As companies increasingly outsource their critical online operations such as Web sites, ecommerce, email and domain name system (DNS), the tolerance levels for outages and downtime continue to diminish. As a result, service availability is top of mind for hosting providers. Distributed denial of service (DDoS) has emerged as a major and growing threat to service provider availability - imposing cost and risk on both providers and their customers alike. Download this paper to learn ...
March 2011- As a wide-open environment, the Internet has allowed a large criminal element to thrive. For evidence, look no further than the escalating growth of botnets and distributed denial of service (DDoS) attacks that have been publicized in recent news. Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
March 2011- This white paper discusses the cyber threats facing today's government infrastructures. It describes IBM's holistic approach to cybersecurity, including a multitiered containment strategy and a layered approach to defense based on the IBM Security Framework
March 2011- In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. The number of platforms from which threats enter organizations on a daily basis continue to grow and they include but are not limited to email, social media websites, smartphones, flash drives and direct hacker attacks.
January 2011- Today’s CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.
January 2011- A perfect storm is brewing, with increasingly complex, persistent cyber threats and more numerous and prescriptive compliance mandates to protect against them. In this white paper, learn how to ride out this storm with automated solutions that reduce threats, meet multi-compliance demands, and help pass audits.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Security Resources
Secure the Enterprise with Confidence