Mission critical defense
Attackers don't work in silos. To defend against them, your defenses can't be siloed either. The teams, tools, and solutions you use in the response ......
June 2010- When an IT system or local area network is down in the realm of public safety, dispatchers, first responders and other decision makers lose access to critical data and applications. This branch office consolidation strategy guide is designed to help public safety organizations keep their IT systems and local-area networks up and running--and keep the public secure.
February 2010- Most financial institutions lack internal resources or the technical expertise necessary to identify all of the risks to information security, making a correct evaluation of risk extremely difficult, if not impossible. Therefore, without knowing where threats exist, or their potential severity, within their information systems, a financial institution is ill prepared to combat a threat, mitigate the costs of a breach, or even face a federal or state examiner’s prying eyes. This white paper ...
December 2007- This white paper describes Video Synopsis technology, a proprietary, innovative image-processing technology being commercialized by BriefCam. Video synopsis is an approach to create a short video summary of a long video. It tracks and analyzes moving objects (also called events), and converts video streams into a database of objects and activities. The technology has specific applications in the field of video surveillance where, despite technological advancements and increased growth in the deployment of CCTV (closed ...
March 2010- Organizations need a secure infrastructure they can rely on, one that mitigates risk exposure, provides regulatory compliance, and protects information assets from a multitude of threats. A solution that combines Brocade's high-performance infrastructure with McAfee's Web gateway results in a best-of-breed security infrastructure that can be tailored to fit the unique requirements of any enterprise.
March 2010- The demands for real-time access to information are causing organizations to rethink their IT methodologies. But new technologies introduce new risks and complexities. An Internet Security System from Brocade and IBM can help organizations build a strong security posture that simultaneously manages risk and embraces change and innovation.
January 2009- When trying to grow into a Transmission Service—as opposed to simply being an IT function—the IT team gains new respect and influence as they bring increased value to the business. Normally, the primary goal of any data transmission department (or file transfer, or network operations, etc.) is to move large batch files between different systems. Since transactions and other data in the files represent significant revenue, the role of the team in ensuring ...
Security breaches are expensive. They cost time, effort, remediation, and reputation restoration. Many IT decision-makers tend to focus their security efforts almost exclusively at the network perimeter. They overlook the software applications that run their day-to-day agencies. These applications are often packed with Social Security numbers, addresses, personal health information, or other sensitive data.
Focusing on security features at both the infrastructure and application level isn’t enough. Organizations must also consider flaws ...
November 2009- Get this 12-point Checklist of key considerations every IT security professional needs to be aware of before choosing a vulnerability management solution.
October 2009- Firewall rules that provide access to a wide array of services in a large network, while at the same time securing the critical assets from attacks, tend to become very large in size and redundant in functionality. As rule bases become large, administrators become hesitant to modify existing rules and instead add new rules for fear of causing an adverse impact on existing service availability. Over time, rule bases become very bloated, requiring not only ...
October 2009- An investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; and provide a solid foundation that increases the effectiveness of the investment in information security. Discover why IDC Research says TripWire can claim complete configuration control as its own domain.
October 2009- A variable frequency drive (VFD) regulates the speed of a three-phase AC electric motor by controlling the frequency and voltage of the power it delivers to the motor. Today, these devices (also known as adjustable speed drives or variable speed drives) are becoming prevalent in a wide range of applications throughout industry, from motion control applications to ventilation systems, from wastewater processing facilities to machining areas, and many others.
December 2008- Consumer electronics and applications are proliferating in corporate IT environments, significantly increasing the threat of lost and stolen data. Personal devices such as smartphones and Mobile Internet Devices (MIDs) are now commonly brought to work and used for business purposes. This consumerization of corporate IT is predicted to accelerate in coming years as Digital Natives -- those raised playing computer games -- penetrate corporate ranks. This generation not only has a great fascination with ultra-modern ...
July 2009- Video surveillance and security are unlike applications typically found in IT environments. Video surveillance systems are real-time, resource-intensive systems that run 7x24x365 in a streaming mode, where the processing power, network bandwidth, disk throughput, and storage capacity requirements are extreme. A proper design of servers, networks, and storage is the key to successful video surveillance systems. Video Surveillance is often like a 911 system. Architecting a reliable surveillance system without excessive cost is important to ...
The traditional security approach addresses each individual attack as it crops up through a detect and blocking schema. However in today’s ever-changing IT environment, sophisticated threats such as Conficker worm continue to evolve and keep security professionals in an unending game of cat and mouse. Read this paper to learn how to:
*Regain control of your environment and address the root cause of attacks
*Automate the detection and remediation of OS ...
As organizations look to keep operating expenses down, “free” technology solutions start to look more attractive. However, when choosing a solution for patching your systems and servers, it is important to consider the total cost of ownership (TCO) and the difference in key capabilities between point patching products and comprehensive patch management solutions.
This whitepaper demonstrates the advantages of a complete Patch Management solution and how it will overall lower operating cost due ...
April 2009- There is a renewed awareness of the value and vulnerability of the personal and financial information of citizens that is collected by state and local government agencies as a result of the increasing number of security breaches leading to data loss. As state and local governments are entrusted with more volumes of sensitive information, the role of those responsible for information security becomes increasingly difficult.
April 2009- To address the growing number of breaches where personally identifiable information (PII) is compromised, states across the U.S. have passed laws calling for businesses and other entities that collect PII to notify individuals of breaches where their personal information may have been put at risk. Specifically, in 44 U.S. states, laws require companies to immediately notify individuals if their personal information has been lost, stolen, or compromised.
April 2009- As your organization puts SharePoint to use, the platform becomes a more strategic and more valuable asset, one that should be managed and secured. Even shortly after deployment, SharePoint sites can propagate swiftly. As more and more workers leverage the sites–-adding information from customer data to intellectual property–-sensitive information (company confidential and regulated information) can become at risk. This report focuses on managing risk within your Microsoft SharePoint environment.
July 2009- Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great strides in helping the industry solve the myriad security problems confronting cloud computing. The benchmark guidelines established by the CSA in the document, Guidance for Critical Areas of Focus in Cloud Computing, is a great first step. This white paper is intended to pick up where the CSA guide left ...
May 2009- The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency and provide “anytime anywhere” access to corporate resources for employees, customers, and partners. As organizations shift from an internal to external focus, the traditional view of identity and access management (IAM) is changing, as well. IAM has long been at the forefront of securing access to Web resources by controlling and managing access rights to sensitive information for authorized ...
July 2009- Review key findings from this study on the impact of data security breaches in the financial industry.
June 2009- How many ways can malware comprise your data? This white paper focuses on methods criminals are using to install malware and effective solutions to thwart attacks.
June 2009- Concerned about the legal implications for message archiving? Read this guide to meeting all federal and industry specific requirements.
June 2009- For the last 15 years, port-blocking firewalls have been the cornerstone of enterprise network security. But much like a stone, they’ve stood still in the face of rapidly evolving applications and threats. It’s no secret that modern applications and threats easily circumvent the traditional network firewall – so much so that enterprises have deployed an entire crop of “firewall helpers” to help try to manage applications and threats, which has only increased cost and complexity ...
May 2009- Read this white paper to learn how a remote data backup solution can safeguard your critical data from loss.
April 2009- This whitepaper addresses common pain points in the existing offshore outsourcing processes and elaborates on how Notetech Software India could implement a customizable but productive methodology to provide its clients a hassle-free outsource experience.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Security Resources
Mission critical defense