- The State of Data Center Networking
- Using Reversible Debugging for Linux to Increase Software Dev Productivity
- HDAP - The World's First Directory Built on Big Data Standards
- Top 10 Things Every Web Application Firewall Should Provide
- Web Application Firewalls Are Worth the Investment for Enterprises
October 2012- PCI DSS expert and QSA Walter Conway takes you on a deep dive tour of tokenization techniques and their merits. He also demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
As compliance demands comprehensive protection of cardholder data, enterprises require comprehensive solutions that support heterogeneous environments with a multitude of servers, operating systems, devices and applications. But getting to that point can be difficult without a good roadmap.
This whitepaper outlines a clear path to full PCI DSS compliance with a cost-effective solution.
June 2012- Despite growing protective security measures, data breaches continue to plague organizations. This paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches. It also discusses file integrity monitoring as a critical component of Payment Card Industry Data Security Standard (PCI DSS) compliance, and shows how NetIQ addresses both security and compliance challenges through the NetIQ Identity ...
April 2012- IBM SmartCloud Notes helps to protect our customers' information through governance, tools, technology, techniques, and personnel. SmartCloud Notes is a full-featured email, calendar, contact management and instant messaging service in the IBM cloud. At IBM, we strive to implement security and privacy best practices. The SmartCloud Notes security controls provide a range of protection of e-mail while enabling business operations.
January 2012- When it comes to acquiring the right security solution today, midsize retailers face a number of obstacles?including costs, complexity and business disruption. This paper analyzes the various challenges and also reviews a number of integrated solutions from IBM that can meet your needs. Read it to learn more.
November 2011- Today's attacks on IT infrastructure are becoming more frequent, targeted and sophisticated. They range from well-funded, state-sponsored attacks to attacks from trusted employees and consultants. And the targets of the attacks are equally wide-ranging, including national governments, utilities or other power-generating infrastructure, and private business. Yet most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come ...
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.
Read this whitepaper to learn about:
• How email encryption plays a critical role in data loss prevention.
• Challenges associated with deploying traditional email encryption solutions.
• How Proofpoint Encryption eliminates key management, administration and end-user adoption issues associated with traditional email encryption ...
Learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest... And why this advice applies to organizations of all sizes, regardless of industry.
Download this Osterman Research report on email encryption and other encryption technologies to learn:
•The serious regulatory and financial consequences of not encrypting content.
• The growing number of data protection regulations that require or imply the use of encryption. <...
July 2011- Email security threats do not discriminate. Whether you're an organization with 50 employees or a global corporation with 50,000, the reality is that spam and viruses can wreak havoc on your business, drain users' productivity and take a major toll on IT resources. SMBs need to make sure they are armed with the best security solutions available - demanding enterprise-class protection paired with fast deployment, ease of management and flexible configuration options. And, all at a price ...
Email is an essential business tool that helps organizations to efficiently communicate -both internally with colleagues and externally with customers, clients, and partners. Yet with this vital tool comes the specter of sensitive data exposure caused by sending unprotected email.
The risk goes wherever unprotected email is transmitted or is stored -including the Internet, cloud-based services, servers, desktop PCs, laptops, and mobile smartphones. The exposure of customer data, intellectual property, or legally protected ...
May 2011- In this case study, a Multi-Program National Laboratory needs to continually enhance effectiveness of protection against escalating global cyber threats such as advanced malware, zero-day and targeted APT attacks that target sensitive data. The solution is the deployment of FireEye Web Malware Protection System 7000 Series appliance. As a result, rapid appliance deployment facilitated dramatic increase in speed of threat detection, notification and resolution. Appliance accuracy and low false positive rates have elevated usability and productivity, ...
May 2011- This paper offers a better and more current framework to understand both the next-generation threat landscape of advanced malware and the five key design principles needed to eliminate the devil's bargain implicit in today's dated and highly ineffective rule-, signature- and list-based defenses.
May 2011- This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
April 2011- This white paper discusses the threats that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. It uses research from recent Osterman Research surveys, as well as information from a variety of other data sources to illustrate how to address and overcome security gaps.
Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data.
PCI DSS requirements apply to all system components that are included in or connected to ...
February 2011- Tokenization is more than a security measure and more than a cost savings technique. Tokenized payment data opens up numerous possibilities, especially for businesses that have not previously kept transaction data after the authorization and settlement processes. What kind of possibilities? Non-sensitive tokenized data can be used in back-end business operations to develop innovative marketing campaigns, create customer loyalty programs, conduct business data analysis, and even assist with loss prevention. By substituting tokens for Primary ...
March 2011- The growth of mobile devices and smartcard technology is increasingly playing a role in the development of an organization’s security strategy. Mobile devices enable organizations to leverage a very flexible, convenient and low-cost method for authentication. Organizations also can begin leveraging smartcard technology to consolidate two security environments: physical and logical access. Once the responsibility of two distinct organizations within a company, combining physical and logical access solutions provides these organizations consolidated management, improved ...
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business’s reputation and even lead
to criminal prosecution.
This white paper explores the business and compliance issues ...
July 2010- Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. Companies know they can’t afford a data breach – customer churn, loss of business, brand damage, fines and litigation. In today’s global market, where business data and personal information know no boundaries, traditional point solutions that protect certain devices or applications against specific risks are insufficient to provide cross-enterprise data security. As enterprises seek to protect data from ...
How good is good enough? For companies regulated by the Payment Card Industry Data Security Standard (PCIDSS), the question remains, even after a successfully completed audit. The very next day a new system may be installed, a new threat discovered, a new user added, a new patch released. If an audit is passed and a breach occurs, the impact would still potentially be devastating.
Business and security leaders must constantly strive to find ...
Steps to Take Today for a More Efficient, Secure Key Infrastructure
The increasingly prevalent use of data protection mechanisms in today’s enterprises has posed significant implications. Enterprises today need to balance several equally critical business mandates:
Strengthen security. Businesses need to enhance data security to minimize the risk of loss or breach of sensitive, personally identifiable information of patients, customers, or employees. Companies must also protect intellectual property, such as ...
Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk. How can companies enforce security policy and cost-effectively meet compliance objectives when documents must be shared with partners, investors, board members, and others outside the enterprise?
This white paper by Cheryl Klein, CPA, CISA, ...
This educational, unbiased white paper cuts through the techno-babble and discusses how to select appropriate software to meet PCI requirements for encryption and key management. It is intended to provide the information you need to make an intelligent cryptographic choice.
PCI lists broad requirements for protecting credit card data, both in storage and in use, with encryption the prescribed linchpin for security. While cryptographic options for data in motion are well defined, as ...
September 2010- This white paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Managers everywhere must also find a balance between allowing reasonable personal internet use at work and maintaining productivity and concentration in the office.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services