December 2012- IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
December 2012- Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualised environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and deprovisioning environment while experiencing the loss of ...
December 2012- In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are overly complex and are not suited for business users. To find out how the integrated Role and Policy Modeler component of IBM Security Identity Manager ...
A Distributed Denial of Service (DDoS) attack against your organization’s network and systems can bring your online business to a grinding halt, costing you hundreds of thousands – even millions – of dollars, ruining your brand, and driving away your customers.
Far too many organizations are ill-prepared to deal with the effects of DDoS attacks and other Internet security threats. They rely on traditional security devices including firewalls, intrusion prevention systems (IPS) and other ...
The tremendous scalability, flexibility, and speed of Infrastructure-as-a-Service (IaaS) make it one of the fastest-growing sectors of the cloud computing markets. IaaS providers combine virtualization technologies with massive infrastructure to deliver bandwidth, storage, and CPU power on-demand and with granular control over scale and costs. The potential benefits of hosting applications and workloads on cloud servers are enormous, making cloud servers the de facto norm for a rapidly growing set of use cases.
Cloud computing has sparked a huge trend in rapid-fire application development and dynamic, elastic application hosting. Desires for cloud-based delivery and the emergence of software-defined infrastructure have caused developers, technology operations and security functions to converge
These cross-functional cloud teams are responsible for securing the servers and applications under their care. PCI compliance is a very common demand, one that presents special challenges in the cloud.
This white paper provides cloud ...
August 2012- Over the past few years, ESG has noticed a distinctive trend: many large organizations are now eschewing reactive information security and regulatory compliance activities in favor of structured and documented risk management.
July 2012- 3rd generation Intel Core vPro overview covering threat management, identity and access, data protection, and monitoring and remediation.
Keeping up with a quickly expanding business is difficult if you do not have the right tools. Cricket Communications was growing in its number of subscribers at a rate of 10 to 20% annually and needed a system that could handle processing of up to 3,000 new subscriber requests per hour.
It implemented automated business processes and contract processing systems to keep up with the new requests, but if an error occurred the whole system would ...
June 2012- Expedia, Inc. is the largest online travel company in the world. Serving customers in an on-demand fashion - where user experience and system uptime is everything - puts a severe demand on an IT infrastructure. This analyst case study reveals how Expedia used Splunk to improve response time by 300%, reduce downtime by 90% and retire over 200 servers. Discover how Expedia delivered a total annual ROI of $14 million.
May 2012- Successfully backing up critical systems and data is key to disaster recovery and business continuity. Yet, Symantec's 2011 SMB Disaster Preparedness Survey revealed that only half of respondents have appropriate backup and data recovery plans in place. Why? Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
April 2012- Most companies place a high premium on IT security, and believe they have ironclad protection. However, the toll from cyber-attacks continues to climb. That's because there are gaping vulnerabilities in the way defenses are deployed - firewalls, endpoint security and even protected storage can all be bypassed by attackers. Learn how a data-centric security approach can make data useless to data thieves.
April 2012- Many data breaches occur at companies that already have a data security policy in place. What is the problem? Typically, intrusion detection and other technologies designed to keep intruders out of your system are built to protect against previously known hacking strategies. This approach exposes your IT systems to great risk as new methods of intrusion are constantly being devised. Learn how to protect corporate data with a data-centric encryption strategy.
April 2012- Compared to past approaches Voltage SecureData offers distinct advantages. In addition to the security advantages of FPE and tokenization, integration efforts are reduced to hours and days, instead of months or years as in the past. De-identification of data for testing or other purposes leverages the same data protection used in production. As a true enterprise platform, clients can start with simple applications and expand the use of Voltage SecureData across any number of applications ...
April 2012- As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. In the future, you will encrypt data - both in motion and at rest - by default. By encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less ...
Today's security landscape includes a broader set of attacks and more innovative and targeted attacks coming from persistent adversaries. This solutions guide explores Splunk's unique security intelligence approach that monitors for known threats as reported by rule based systems and also watches for unknown threats using extensive analytics on system and user behavior.
Read how security teams are bringing their investigations to the next level with these key features:
• Real-time forensics ...
April 2012- Help create business value by becoming a social business in the cloud. IBM SmartCloud for Social Business social collaboration services provide integrated email, social business capabilities and third-party applications to help deepen relationships, drive operational effectiveness and optimize workforces.
As distributed denial of service (DDoS) attacks escalate in size and complexity, their detection and mitigation requires the collaboration of all stakeholders - from the enterprise to the service provider. The Cloud Signaling Coalition (CSC), from Arbor Networks, enables this collaboration by facilitating the local and upstream mitigation of application-layer DDoS attacks, as well as flood-based DDoS attacks, in an automated and real-time manner.
This white paper examines how cloud signaling works and ...
March 2012- Size, frequency and complexity of distributed denial of service (DDoS) attacks are all on the rise, making data center security and availability a top concern for most enterprises. The goal of the attack is to prevent the data center from functioning. This translates, potentially, to a complete shutdown of ecommerce transactions, email delivery, voice or DNS services, Web site access and other business-critical services. The business impact will depend on the length of time the ...
February 2012- Advanced Persistent Threats or APTs are a class of highly sophisticated, targeted attacks. Since the publicity associated with the January 2010 news that numerous large organizations in the Internet, finance, technology, media, and chemical sectors had been targeted by APTs, this style of attack has received a great deal of attention. Since 2010, numerous APT attacks have been publicly acknowledged by organizations of in the software, security, defense and other industries. The wide range of industries these ...
November 2011- Today's attacks on IT infrastructure are becoming more frequent, targeted and sophisticated. They range from well-funded, state-sponsored attacks to attacks from trusted employees and consultants. And the targets of the attacks are equally wide-ranging, including national governments, utilities or other power-generating infrastructure, and private business. Yet most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come ...
September 2011- The IBM Security Services approach for Health Insurance Portability and Accountability Act compliance overview. IBM Security Services is uniquely able to provide comprehensive com-pliance with the administrative, technical and physical safeguards withthe research and consulting offerings provided by IBM Professional Security Services.
IBM Tivoli Endpoint Manager helps organizations automatically manage patches for multiple operating systems and applications across hundreds of thousands of endpoints regardless of location, connection type or status.
IBM Tivoli® Endpoint Manager, built on BigFix™ technology,combines the separate pieces of the patch management puzzle into an intelligent, simplified solution that streamlines and opti-mizes the process of researching, assessing, remediating, con-firming, enforcing and reporting on patches.
August 2011- NETGEAR delivers simple solutions that help IT organizations create elegant, full-featured data protection without breaking IT budgets.
August 2011- SMBs can achieve the same virtualization results as big companies on a more appropriate scale, using products and services that are available in the right size and price point. While larger firms have traditionally created lower-end products for smaller businesses, there is an inherent conflict of interest that may doom the products to weakness or premature irrelevance.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services