The recent explosion of employee-owned mobile devices used for work, a trend known as bring your own device, has introduced a new set of vulnerabilities and opportunities for perpetrators of highly sophisticated advanced persistent threats. Unlike past attacks that caused widespread outages, mayhem and lost productivity, APTs aim for theft of highly valuable intellectual property, finances and customer personal information
Mobile security management from companies such as Marble Security provides mobile and BYOD-enabled ...
August 2013- Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. BYOD enables people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner. This white paper provides guidance for selecting technologies and developing policies to introduce a BYOD initiative. Download the white paper
July 2013- A shift in the information security paradigm is well underway. We operate in an Age of Zero Trust, where the lines of trusted or untrusted users are becoming increasingly hard to credibly define. In this whitepaper you will learn about the increased risks and exposures caused by the de-perimeterization of computing and the failure of passwords. In addition, you will learn how weak authentication can sabotage other security measures, and why strong two-factor authentication should ...
July 2013- Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.
Controlling access to privileged accounts by controlling only the password does not limit what malicious users can do once they access a privileged account. This applies both to insider threats as well as external, Advanced Persistent Threats or phishing schemes to reveal key passwords.
Discover how privileged identity management tools can help you:
Mitigate risk and increase data integrity by securing privileged user passwords
Track actions of all individuals, even ...
New business opportunities are taking shape as consumers across the globe are adopting new mobile devices, high-speed access and innovative mobile applications. But this proliferation of mobile devices, the development of intelligent and composite applications, the number of multi-device users, and the shift to bring your own device (BYOD) has created many challenges for businesses to effectively capitalize on mobile opportunities.
Download this white paper to explore how to:
Grow your ...
To protect your consumer and enterprise data in the fast-growing mobile app and Bring Your Own Device (BYOD) business environment, your enterprise needs a solid security strategy that addresses, and supplies effective mechanisms for, mobile authentication. Deploying access policies that can be applied to multiple interaction methods provides a more user-friendly and consistent experience, while simplifying their administration and reducing support costs.
Download this white paper to discover how to:
Failure to govern and control privileged identities could result in data loss or destruction, malicious or inadvertent damage, fines, and even lawsuits. The processes for reviewing and approving administrators' access rights and policies are often manual, labor-intensive and inefficient, making real-time adherence to segregation of duties and other compliance policies very difficult.
Download this white paper to learn how to:
Regulate and audit privileged user access while mitigating risk
June 2013- Protecting enterprise operations from hacks, malware, targeted attacks, advanced persistent threats (APTs) and other malicious activity remains a challenge for organizations, large and small. The number of breaches continues to grow and shows no signs of slowing despite technology advances and a market flush with cybersecurity products. In fact, according to the 2013 Verizon Data Breach Investigations Report (DBIR), 66 percent of surveyed organizations didn't discover security breaches until months after the fact, and 69 percent of these ...
May 2013- Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment. That's because as the typical IT organization has worked on reducing the risk profile of PC and server operating systems, cyber criminals have started to look for greener pastures - namely among third-party applications. This white ...
May 2013- Organizations are now having to deal with customer data transiting to the cloud, employees bringing their mobile devices to work (and expecting them to be accepted), and hackers looking to score the next big information leak. This whitepaper will assist organizations in crafting a best practices-based information security strategy. It will demonstrate how investing in certificate-based network authentication can be a powerful first step towards a safer, more agile business and will explain certificate based ...
May 2013- Unfortunately, stopping known threats isn't enough to protect real-world networks. Solutions must also stop unknown threats at every stage of an attack. This white paper reveals the results, conducted by the leading independent test laboratory Miercom, from over 2.2 million live web requests of unknown nature simulated as a typical day on a network like yours.
May 2013- IBM QRadar Security Intelligence Platform integrates SIEM, log management, behavioral anomaly detection, and configuration and vulnerability management to give government agencies 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.
May 2013- The following whitepaper looks into eight critical mobile threats SMEs become vulnerable to when their network is open to the many mobile devices available today, remote employees, and personal devices being used for work. The overall goal is to educate on how to implement the right solution to protect against these critical threats and ensure the company network is safe and secure.
This white paper seeks to describe nine schemes used by criminal entities targeting
employee-owned mobile devices to penetrate the corporate firewall and the risks they
pose. The threats discussed here include:
Malware, trojans and zero-day attacks
Compromised Wi-Fi hotspots
Malicious and privacy leaking apps
Jail broken and rooted devices
Unpatched OS Versions
Advanced persistent threats
In addition, ...
May 2013- The mobile market is evolving rapidly. Both the consumer and enterprise markets are experiencing major changes. Room exists for new innovations as well as for established players to develop new revenue opportunities. What challenges will various players in the mobile ecosystem face in the near future, and what opportunities will the market present to them? In this report, Forrester looks at current market and technology adoption trends and makes its mobile security predictions.
March 2013- Company data is one of the most valuable assets of any business. So it's no surprise data protection is at the top of every IT checklist when it comes to file sharing and storage. But what are the necessary steps to stop a data breach as it's happening? And most importantly, how can companies proactively prevent data breach in the first place? Learn why file server attacks happen and best practices to avoid data intrusion ...
February 2013- Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements - regardless of industry, organization size or security skill set.
Coping with the complexities of IT GRC is a growing market dilemma for small and medium organizations (SMEs) and a new IT GRC prescription is well overdue - one that provides true enterprise-class capabilities, but without the enterprise burden on resources.
This paper explains the SME information security landscape and how to best leverage an integrated, cloud-based approach to adopt an IT GRC strategy that reveals your organization's risk posture, enforces security policies, ...
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance.
When you download this free eBook, ...
The increased use of personal iOS and Android devices in your workplace isn't a threat - it's an opportunity. When your employees use their own smart phones and tablets for work activities, they're likely to be happier and more productive. And your company can save money in the long run.
By putting the right usage policies and security technology in place, you can ensure your sensitive corporate data stays safe in transit and ...
October 2012- This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this triage approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...
October 2012- Does your anti-virus bring your systems to a crawl? Is it causing administrators to pull their hair out? This whitepaper shows you how to solve both problems with one product!
October 2012- Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks.
How do you encourage productivity and minimize risks?
Application control is key.
Read "The Five Key Benefits of Application Control and How to Achieve Them," ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services