November 2014- Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
September 2014- Your workforce is using more applications from a wider variety of sources than ever. This causes security issues as users forget passwords, share them or write them down. Single sign-on (SSO) is a quick way to solve this problem. Now is the perfect time to implement SSO. This paper will explain SSO options and questions you should ask to determine the right solution for you. Security and productivity are both at stake: put SSO to ...
September 2014- In today's BYOD world, securing access and maintaining productivity is challenging; users want access from their own devices, and the applications, data and services they're accessing aren't inside the perimeter. But even in this environment, you can secure access. Read this paper to learn how you can implement access controls that keep up with the modern world. Get advice on how to take stock of your environment, leverage your current investments and keep your access ...
September 2014- Many organizations implement identity and access governance (IAG) as a quick-fix to appease auditors and avoid fines. Such an ad-hoc approach can lead to poorly managed access, which in turn can create big security issues. Instead, a proactive IAG program that answers the question: "Who has access to what, and is it appropriate?" not only appeases auditors, it pleases the CIO by helping to prevent risk from insider attacks. Read this white paper to learn ...
Users seem determined to embrace BYOD even if the IT department doesn't. Yet IT admins know that with mobile devices comes a host of security complications. Some of the most common solutions are very unpopular with users, who aren't willing to give IT control of their personal devices.
It doesn't have to be this way. There are solutions that will let IT have more of the security you need while giving ...
May 2014- Contractors are becoming a much larger part of modern business. But most organizations struggle to grant them the right access, and failing to do so can lead to serious security breaches. It's time to find something that will work with your environment--even when contractors are a part of it. This paper explains how you can rethink your identity and access provisioning for better security across the organization. You don't have to live with the risk ...
November 2014- The ubiquity of Active Directory (AD), the rapid adoption of virtualization and the tight integration between these technologies has given rise to today's modern AD virtualized infrastructure. Read this helpful report to explore the interdependent and combined security issues between AD and virtualization. Plus, learn how to identify and manage these risks.
May 2014- This paper discusses the role of out-of-band authentication in battling e-crime.
June 2014- Strengthening online services and protecting funds requires stronger techniques to thwart the wrong user armed with all the right information. Read this paper to learn more.
October 2014- Traditional incident response (IR) processes are being overwhelmed. The increased volume of attacks has caused the number of alerts from detection devices to balloon dramatically. Organizations try to apply traditional incident response processes and procedures for each alert, but discover those procedures are insufficient for continuous application at an enterprise scale.
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continue to rise. But there is good news, too. Security defenses and a strong security posture help drive down the losses.
Separate reports exist for each country, and this ...
September 2014- For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
September 2014- This report outlines Forrester's take on the endpoint security trends seen from Q2 2013 to Q4 2014, looking at IT spend, and the adoption of Endpoint Security Software-As-A-Service. Forrester provides data for organizations to benchmark their spending patterns against their peers, and strategize their endpoint security adoption decisions.
September 2014- Protecting the government's data is an all-consuming, top priority. As the federal government's data growth continues to spiral, and as the types of data threats and leakage change, data and storage managers have no choice but to be on the front lines of protecting their agencies' data. That means first building a solid data storage and management foundation one that ensures that all data is accounted for at all times and that it's continually backed ...
September 2014- Chief information security officers (CISOs) and other key security decision makers should follow a phased approach in developing and maintaining a CSIRT that will identify, contain, escalate, investigate and remediate incidents in a timely and efficient manner. Read Gartner's report on how a phased approach to the creation of the team will ensure optimal effectiveness.
September 2014- This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.
September 2014- This analyst paper discusses the effects of card not present (CNP) fraud and best practices for financial institutions and merchants for managing fraud risk across multiple channels including the Web, mobile and POS terminals.
August 2014- Get Insight into the ways attackers exploit end-users' psychology. Learn how attackers exploit end-users have significant security implications for enterprise preparedness and defensive strategies
Cybersecurity for the enterprise. There is no silver bullet. But as business becomes more connected and as data moves further outside the organizational walls, enterprises need look at weaknesses in the security chain - and a good place to start is in the supply chain.
Small businesses sit on the "front lines" in the round-the-clock cybercrime battle. Think about how many small businesses, suppliers and customers have access to different areas of an ...
When it comes to cybersecurity, perhaps nothing has been as highly touted as the answer to every executive's prayers as big data. Cybercrime, being inherently technical, can provide vast droves of data to be analyzed.
The real challenge is translating complex, technical cyber data into practical information that can be easily understood by the business as well as security pros. Many variables come into play when it comes to understanding cyber risk: your ...
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. It only takes one breach and the cost to your organization can spiral out of control.
In this whitepaper, you will discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Through the Intelligent Compliance process, you ...
July 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...
June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.
Gone are the days when corporate network security could rely on a WAN gateway firewall and control of physical access. The increasing use of bring-your-own-device (BYOD) means threats can enter via your employees' personal devices.
A 2013 Ovum employee study shows that over sixty percent of employees bring their own devices to work and access corporate resources with them. Whilst BYOD brings numerous advantages, the Cisco 2014 Annual Security Report calculates the average cost of ...
Identity Provisioning is still an important part of the Identity and Access Management market. That's why the field is crowded with vendors claiming to have the solution your business needs. But which one is right for your company?
This Leadership Compass delivers an overview of those market segments. Learn more about established vendors, smaller or regional vendors with good growth potential, and which vendors your company should take a close look at when ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services