McAfee talked to customers and asked them about their primary issues with SIEM. Here are the top five issues:
• Big Security Data
• Content and User Awareness
• Dynamic Context
• Solution Customization
• Business Value
In order for SIEM to help usher in more effective security and risk management strategies-particularly as they relate to threat mitigation, embracing trends, and aligning with business priorities- these five issues must be solved. Read ...
The trend toward individuals and even departments subscribing to easily available cloud-based services, such as file sharing applications, without IT authority, is pushing many companies to deploy a corporate online file sharing and collaboration solution (OFS).
Download the "Security Considerations for Online File Sharing" white paper and learn what you need to look out for when considering an Online File Sharing Solution.
• Advantages and disadvantages of different ...
September 2013- Distributed denial of service (DDoS) malware and tools threaten an organization's Internet-facing systems. This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities and the network indicators they generate while performing the attack methods. It includes new attack vectors observed in late 2012/early 2013 with regard to highly publicized and targeted DDoS attacks.
September 2013- As the 2013 peak online holiday season approaches, the world's retail industry eagerly anticipates this projected growth in spending. However, as an online retailer, your business has the added burden of ensuring website availability and security. In Verisign's latest version of The Ups and Downs of Network Availability, a set of four best practices is shared to assist organizations in driving high availability of their e-Commerce systems this holiday season. Download a copy today.
February 2014- In today's cyber climate Distributed Denial of Service (DDoS) attacks are a matter of when, not if. This article provides an expert overview of the most common types of attacks and five key DDoS mitigation steps enterprises can take now to prepare for a future attack.
September 2013- Given the extraordinary and rapid changes in the DDoS terrain, traditional DDoS mitigation tactics are no longer sufficient to protect an organization's critical web systems. Verisign has identified a set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
February 2014- Distributed Denial of Service (DDoS) attacks today are targeting businesses of all sizes and types. This article provides an expert overview of common methods of DDoS attacks and four main ways enterprises and providers of Web applications can protect themselves and their customers from falling victim to this type of attack.
September 2013- Proactive DDoS threat mitigation may be one of the easiest and most cost-effective tactics for minimizing financial risk associated with IT-related downtime. This paper draws on Verisign's DDoS mitigation expertise to examine the threat of DDoS in the context of IT availability and enterprise risk management.
July 2013- The RUAG Group is an international aerospace and defense technology company with production sites in Switzerland, Germany, Sweden, Austria, Hungary and the United States. Following a merging of IT departments, RUAG wanted to consolidate its local backup processes with minimal impact to users. After testing, the company successfully migrated its existing backups to NetVault Backup over a two-month period, all without adverse impact on daily business or service-level agreements.
July 2013- Alter Ego leads the way in video production and visual effects in the high-end Canadian marketplace, combining decades of collective experience with the latest in nonlinear digital technology. By switching to Dell's NetVault Backup, Alter Ego found a solution that did more than meet its technical backup requirements. NetVault gave Alter Ego's staff the flexibility to perform their own recoveries while enabling the company to remain operationally efficient over the long term.
July 2013- Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper "Building the mobile enterprise: integrated, secure and productive" explains the difference and offers a checklist of eight key items to consider when planning your mobility initiatives.
July 2013- We all know how major security incidents can affect a company's data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper "Responding to - and recovering from - sophisticated security attacks" details four proactive steps that you can - ...
July 2013- IBM Managed Security Services (MSS) monitors tens of billions of events per day for more than 3,700 clients in more than 130 countries, 24 hours a day, and 365 days a year. While analyzing threats is critically important, it is only part of the story. This report is intended to ask the follow-up questions. How many attacks turn into incidents? What measures could have stopped them? And how do these trends vary from industry to industry? The results and ...
July 2013- Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study ?The Risks of ?Do It Yourself? Disaster Recovery? to learn the critical components that make a disaster recovery strategy successful, and the key questions you need to ...
July 2013- In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability.
Failure to govern and control privileged identities could result in data loss or destruction, malicious or inadvertent damage, fines, and even lawsuits. The processes for reviewing and approving administrators' access rights and policies are often manual, labor-intensive and inefficient, making real-time adherence to segregation of duties and other compliance policies very difficult.
Download this white paper to learn how to:
• Regulate and audit privileged user access while mitigating risk
• Enhance ...
As IT and users fight the data deluge brought on by big data, social networks and multimedia, the benefits of implementing enterprise-class file sharing quickly come to light.
Almost every business has had to deal with mailbox bloat: attachments ranging from presentations to videos that end up in the inboxes and outboxes of email systems. Beyond clogging mail server arteries, the constant email barrage can leave collaborating teams wondering which versions of what ...
May 2013- IBM QRadar Security Intelligence Platform integrates SIEM, log management, behavioral anomaly detection, and configuration and vulnerability management to give government agencies 360-degree security insight for superior threat detection, greater ease of use and lower cost of ownership.
May 2013- For the busy executive, security is not an issue that can simply be delegated; it must be embraced as another important component of any plan for doing business in an increasingly complex and technology-driven world.
May 2013- This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations - from Fortune Five companies to midsize enterprises to government agencies - to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection, Fraud discovery, Risk assessment and management, and Regulatory compliance.
May 2013- News headlines about the increasing frequency of information and identity theft have focused awareness on data security and privacy breaches - and their consequences. In response to this issue, regulations have been enacted around the world. Although the specifics of the regulations may differ, failure to ensure compliance can result in significant financial penalties, criminal prosecution and loss of customer loyalty. In addition, the information explosion, the proliferation of endpoint devices, growing user volumes, and ...
May 2013- The IBM z/OS mainframe environment has earned a reputation for superior application performance, availability and data security while managing extremely large volumes of application data. To maintain a competitive advantage, organizations that manage their mission-critical operations on the IBM System z platform must continually look for improvements in technology, processes and best practices.
May 2013- In today's business environments, mobile devices make up the fastest growing segment of computing devices - outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-owndevice (BYOD) model - allowing employees to use their own mobile devices for business purposes. This often leads to employees having a mix of corporate and personal applications on the same device, which gives the security team ...
May 2013- This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program's maturity. By addressing key considerations, providing clear and actionable items, and offering real-world examples, these five steps provide an adaptable strategy to help your organization get started and maintain an effective, ongoing application-security strategy.
May 2013- This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services