Mission critical defense
Attackers don't work in silos. To defend against them, your defenses can't be siloed either. The teams, tools, and solutions you use in the response ......
July 2011- In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. The number of platforms from which threats enter organizations on a daily basis continue to grow and they include but are not limited to, email, social media website, smartphones, flash drives and direct hacker attacks.
July 2011- Email security threats do not discriminate. Whether you're an organization with 50 employees or a global corporation with 50,000, the reality is that spam and viruses can wreak havoc on your business, drain users' productivity and take a major toll on IT resources. SMBs need to make sure they are armed with the best security solutions available - demanding enterprise-class protection paired with fast deployment, ease of management and flexible configuration options. And, all at a price ...
Can one single desktop virtualization technology fit every user - regardless of role, location or connectivity? Quest Software and MokaFive have teamed up to provide a desktop virtualization solution set that securely, centrally and affordably delivers Windows desktops and applications to your users regardless of role, location, device, and degree of connectivity.
If you have a diverse workforce with varying workspace needs, read this new Quest Software datasheet today.
Information Security is a business-critical function for modern law firms.
Through the insights in this report, lawyers and law firm executives will gain a better understanding of the threats, risks and realities challenging today's technology-enabled law firms.
This report seeks to help law firms of any size to ensure continued success and growth through reliable, productive and secure information systems. Understanding the threats posed by the widespread adoption of technology is a business-critical ...
Today's businesses are constantly being probed and attacked by cybercriminals searching for sensitive data and system weaknesses. This Executive Brief profiles several "generations" of cybercriminals over time, and explains how the criminals, methods and motivations have evolved.
Download this brief to understand the motivations and methods of cybercriminals, to help you better gauge risk and take decisive actions to protect your organization.
Does it cost a business more to manage IT security internally than it does to entrust an experienced third party to do it?
Download this whitepaper to discover the 5 cost considerations, 6 best practices to security selection and whether your small organization is best suited for in-house security or for external managed security.
All companies that process, transmit or store credit card data must comply with PCI DSS v2.0. This white paper highlights the 12 requirements of PCI DSS and explains how one solution addresses all 12 requirements.
Discover how to implement effective controls to protect cardholder information and demonstrate provable compliance with one easy step.
May 2011- In this case study, a Multi-Program National Laboratory needs to continually enhance effectiveness of protection against escalating global cyber threats such as advanced malware, zero-day and targeted APT attacks that target sensitive data. The solution is the deployment of FireEye Web Malware Protection System 7000 Series appliance. As a result, rapid appliance deployment facilitated dramatic increase in speed of threat detection, notification and resolution. Appliance accuracy and low false positive rates have elevated usability and productivity, ...
May 2011- This paper offers a better and more current framework to understand both the next-generation threat landscape of advanced malware and the five key design principles needed to eliminate the devil's bargain implicit in today's dated and highly ineffective rule-, signature- and list-based defenses.
May 2011- This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
April 2011- This white paper discusses the threats that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. It uses research from recent Osterman Research surveys, as well as information from a variety of other data sources to illustrate how to address and overcome security gaps.
Findings of an inspection of over 100,000 endpoints across multiple enterprises confirmed some type of breaches in security and compliance. Typically, 10-35% of endpoints demonstrated some kind of security threat or compliance issue. The most notable findings of the 2010 study were a dramatic rise in unmanaged machines and miss-configured anti-virus software and other third-party agents.
IT professionals of today have increased pressure to efficiently manage desktops and machines inside their corporate environment and in remote locations; and remote desktop support software is among the most powerful tools available to help achieve these goals.
With remote support software, your help desk staff won?t have to personally travel from machine to machine to resolve users? problems. Instead, they can simply click a button to view and operate the problem ...
March 2011- In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. The number of platforms from which threats enter organizations on a daily basis continue to grow and they include but are not limited to email, social media websites, smartphones, flash drives and direct hacker attacks.
March 2011- A scalable and configurable identify lifecycle management foundation is one key to improving the operational efficiency and effectiveness of enterprise IT organizations. Download this report to understand the total economic impact and ROI of CA Identity Manager, and how it can reduce the tasks and processes associated with user provisioning, as well as decrease the risk of security breaches and audit remediation.
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business’s reputation and even lead
to criminal prosecution.
This white paper explores the business and compliance issues ...
January 2011- A perfect storm is brewing, with increasingly complex, persistent cyber threats and more numerous and prescriptive compliance mandates to protect against them. In this white paper, learn how to ride out this storm with automated solutions that reduce threats, meet multi-compliance demands, and help pass audits.
Many organizations today are so compliance-focused that they take a bare minimum security approach to securing the organization's sensitive data. They simply purchase an SIEM and/or log management solution and view that as sufficient. What they're really doing is making sure they can check a compliance checkbox for regulations and standards like PCI, ISO 27001, NERC, and others that have log management or SIEM-related requirements. In reality, they're neither truly compliant nor secure.
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned
by imposters with malicious intent. br>
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need ...
October 2012- Your network is time stamping files, email, transactions, etc., while your server logs are recording the transactions in case you need that information. Fundamental to all of this is the belief that the time is correct. This paper describes why network time synchronization is critically important.
October 2012- This white paper provides a compelling argument for having accurate and synchronized time in an IT infrastructure. It discusses the technical and business consequences that can occur when clocks in a network fall out of synch.
November 2010- This white paper on PCI compliance explains why compliance for compliance's sake is not a best practice in protecting cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) has been evolving for many years and will continue to be enhanced to address new security threats and protection measures. With maturity of the DSS, many security auditors are beginning to press companies that accept payment cards to demonstrate more than just 'forward progress' toward ...
Service Request Management and IT Service Management (SRM/ITSM) systems have provided organizations with more efficient approaches for request and delivery of IT services, resulting in decreased lead times, faster delivery of critical IT services to the business, reduced IT operations cost and greater business value.
IT organizations still struggle when it comes time to grant or change user access. Many businesses rely on manual approaches to access request and change management. Other ...
managing access change has increased exponentially due to the fragmentation of information systems and resources .From a business perspective, users require access to what they want, where they want it, when they want it such that business operations are not slowed or blocked altogether. From an IT perspective, operations and security personnel are challenged to field and fulfill requests in a secure and compliant fashion.
Achieving these goals in a highly distributed and ...
Findings gathered from the survey of 728 experienced IT practitioners at multinational corporations and government organizations show that ineffective access governance processes expose enterprises to serious noncompliance and business risks.
When compared to Ponemon Institute’s first access governance study, published in 2008, respondents report even greater difficulty with key access governance issues, such as poor management of access rights and trouble keeping pace with access changes.
Survey results indicate that many organizations ...
The losses attributed to financial fraud are alarming. The financial services industry has become a primary target of cyber attacks on a global scale and, in 2009 alone, suffered losses totaling $54 billion - an increase from $48 billion in 2008. Of equally grave concern to financial services institutions is the damage cybercrime can cause to reputation, along with customer churn, both of which can have a significant impact, and possibly devastating, effect to revenue.
While all ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Security Resources
Mission critical defense