Mission critical defense
Attackers don't work in silos. To defend against them, your defenses can't be siloed either. The teams, tools, and solutions you use in the response ......
Walls have served multiple purposes throughout history. The Great Wall of China defended against invaders, while the Berlin Wall kept citizens from freely traveling beyond the control of their rulers.
Network security relies on similar premises. For years network security professionals touted “perimeter security” as the primary solution to keep the bad guys out and the good guys in. However, just as guns and air attacks overcame protective walls,changes in malware attacks ...
August 2010- Penetration testing is much more than a necessary process to satisfy compliance obligations: It is a critical first step in the information and network security lifecycle and an important component of a full IT Security Compliance program. This white paper defines the different types of penetration tests and clearly explains the reasons why an organization should perform the tests. Readers will not only find out the benefits penetration tests can provide, but also where they ...
September 2010- This white paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans. Finally, this paper will look at the Symantec Hosted Services MessageLabs™ Complete Email Guard solution and how Symantec Hosted Services can help protect an organization against targeted Trojans in the future.
September 2010- This industry report covers the email gateway market. Gartner, Inc. positions Symantec in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). In this report, Gartner analysts note that, "The e-mail security market is very mature. Targeted phishing detection, outbound e-mail inspection, encryption and delivery form factor are the major differentiators." Please enter your contact information to view the complete Gartner Magic Quadrant for ...
Zero-Day, Aurora, APT – a lot of different names describe today’s targeted attacks that boast unlimited tenacity and resources. The explosion in media coverage underscores a reality that security professionals have known for some time: the traditional reactive approach of blacklisting known viruses is simply no match for today’s modern malware and advanced threats.
How can you combat these evolving, well-funded threats that continue to outsmart existing defenses? According to Gartner, Application ...
While many organizations have employed smart card identification to enhance their physical security infrastructure, data centers in particular can benefit greatly from the two-factor authentication that a smart card inherently provides to the logical realm.
When seeking a smart card-enabled KVM system, choose not only a solution that fulfills the basic requirement of supporting PKI authentication to multiple servers from a single location, but also one that makes the necessary KVM feature adjustments ...
May 2010- Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
This whitepaper will explore how marketing leaders and business decision makers like yourself can align trust, credibility and privacy processes in your organization—and your company’s broader ecosystem—into a Business Integrity Strategy.
The whitepaper will also examine the hard and soft costs—including opportunity costs—of poor trust, and will examine ways to build trust in your organization.
The Center for Strategic and International Studies (CICS) report recommends broad adoption of penetration testing across the federal space, and greater use of vulnerability and exploit testing to improve the nation’s cybersecurity standing within several different contexts.
This white paper outlines the key CICS recommendations and identifies a commercial software solution and services that address each of these key issues.
July 2009- For today's organizations, email is absolutely critical to the health and efficiency of business-critical applications. Proper management and protection from the growing array of threats that impact it is an increasingly vital initiative. Systems designed to protect email systems and users from spam, viruses, malware, phishing attacks and other threats must be extremely effective. They must operate with virtually no downtime and they must be easy to manage. This Osterman Research white paper presents the ...
Organizations of all sizes transmit confidential business information by email. If that data falls into the wrong hands, the reputation of a company’s brand and vital relationships with partners, stakeholders and customers can be severely damaged.
In addition, industry and government regulations exert constant pressure on businesses to protect the confidentiality of information they send via email. To reduce risk, companies must limit the amount of sensitive data that they transmit by ...
December 2007- This white paper describes Video Synopsis technology, a proprietary, innovative image-processing technology being commercialized by BriefCam. Video synopsis is an approach to create a short video summary of a long video. It tracks and analyzes moving objects (also called events), and converts video streams into a database of objects and activities. The technology has specific applications in the field of video surveillance where, despite technological advancements and increased growth in the deployment of CCTV (closed ...
March 2010- Organizations need a secure infrastructure they can rely on, one that mitigates risk exposure, provides regulatory compliance, and protects information assets from a multitude of threats. A solution that combines Brocade's high-performance infrastructure with McAfee's Web gateway results in a best-of-breed security infrastructure that can be tailored to fit the unique requirements of any enterprise.
March 2010- The demands for real-time access to information are causing organizations to rethink their IT methodologies. But new technologies introduce new risks and complexities. An Internet Security System from Brocade and IBM can help organizations build a strong security posture that simultaneously manages risk and embraces change and innovation.
February 2010- Running your database in a virtual environment, or even in the cloud, presents some unique challenges for database security. The benefits of virtualization are clear, including: the ability to share resources through server consolidation, quickly scale up (and down) capacity based on changing needs, and to flexibly update servers without impacting production. Less hardware can even mean a greener data center. But, this flexibility results in a much less static environment that must be carefully ...
February 2010- SophosLabs received 50,000 new malware samples every day in 2009. Malware attacks are broadening and becoming more evasive with social networking sites and new computing platforms becoming primary targets for hackers. Read the 2009 security threats trends and learn how to protect yourself in 2010.
February 2010- In tough economic times, it is more important than ever to be mindful of common sense security practices. The security posture of your organization can be increased with simple to remember safety tips, inexpensive security technology solutions, and by making your employees aware of rising security threats and ways to mitigate these threats. Risk is inherent to business operations and you can not totally eliminate all types of risks; however, there are some fundamental practices ...
February 2010- This whitepaper describes a practical approach on how to test Websites for flaws in role-based authorization controls. The first two sections discuss the importance of testing these controls and how this testing is tied to the business that the Website supports. The rest of the paper outlines the general approach and some specific tools and techniques that can be used.
December 2005- Healthcare organizations are in the midst of a complete turnaround in regard to information security and privacy. Times have changed. Through the onslaught of regulations and privacy liability, healthcare organizations are changing course. Learn how Intrusion Prevention Systems (IPS) can address the challenges of today’s healthcare organizations.
December 2005- The degraded service and lost business from a Denial of Service (DoS) attack can lead to staggering costs both during and after an attack. Beyond the immediate costs, the lasting effects of a successful DoS attack include lost customers, loss of faith in the service’s dependability, and damage to the corporate brand. This white paper focuses on how Intrusion Prevention Systems (IPS) can address these challenges.
January 2009- There is some confusion in the marketplace about intrusion-security systems. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have similar names. Download this white paper provided by TippingPoint to learn the difference between the two solutions and the eight questions to ask about Intrusion Prevention Systems (IPS).
January 2010- Learn about Novell's practical approach to cloud computing and solutions that create a service-driven data center for advanced business service management capabilities, greater visibility, and better security.
January 2010- The average laptop can carry up to a half-terabyte of storage, while keychain-sized USB storage devices can hold entire customer databases. Its users promiscuously connect to any network within wireless range of their laptops, e-mailing and exchanging most sensitive information via a mix of private and public services. One of the most promising techniques to help reduce this risk is DLP.
January 2010- Every organization is at risk of confidential information loss. Organizations must protect the information itself, inform the behavior of those carrying the information, have visibility regarding where their confidential data resides on their network, have influence over where that data is going, and implement a policy for managing it.
December 2009- Increasingly, businesses of all sizes are choosing to migrate their data, applications and services to the cloud. The advantages are clear--increased availability, lightweight, easily accessible applications, lower maintenance and administrative costs--but so too are the risks. As data migrates to the cloud, it becomes a tantalizing target for malicious actors all over the world. IT administrators and CEOs may love the fact that their applications are now accessible from anywhere but may not realize that ...
December 2009- Does your business have the right procedures and equipment to recover after a disaster? Download this whitepaper to get the tips on protecting your IT infrastructure.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Security Resources
Mission critical defense