Though many enterprises have advanced disaster recovery technologies put in place, they still fall short when it comes to actual preparedness due to a lack of formal processes and a strict regimen for exercising DR plans.
This report details 10 tips for updating and improving your current DR exercise program to help you meet expected recovery objectives when faced with an unexpected event.
October 2012- Discover how organizations are protecting larger and larger volumes of sensitive data while still allowing users to easily conduct business.
October 2012- Cyber-attacks are now about making money. ACAD/Medre.A is a terrifying worm that stole AutoCAD files. This whitepaper shows how industrial espionage is a new threat.
October 2012- This guide provides practical information to help you integrate security planning into your cloud computing initiatives - from data center to endpoint devices.
September 2012- Security is a competitive differentiator for SmartCloud for Social Business. SmartCloud for Social Business's business-ready security is based on a deep understanding of security and privacy best practices developed at IBM over decades of managing data and systems on behalf of IBM and its clients. IBM's security controls provide privacy and controlled authorization to sensitive information while enabling business operations. SC4SB protects our customers' information through governance, tools, technology, techniques, and personnel, each of ...
September 2012- Converging trends toward consumerization, thin-client deployment, enhanced security requirements, and wide adoption of cloud-based services are driving increased interest in desktop virtualization.
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements.
Author and information security expert Felix Santos discusses:
• Information security and data protection in the cloud
• Recent cloud standards and audit initiatives
• Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves.
This white paper explores ten policy best-practices for secure and compliant enterprise mobility including industry regulations, passcodes, secure email, apps and features.
August 2012- As organizaç ões de TI são agora exigidas a prestar suporte a tudo, desde sistemas legados e armazenamento, até configuraç ões virtualizadas e computação baseada na nuvem em ambientes complexos e heterogêneos. O papel cada vez mais crítico dos serviços de suporte por provedores externos é discutido e destacado na abordagem desses ambientes de TI daqui em diante.
July 2012- The prevalence of mobile technology has led to unprecedented work efficiencies and a growing trend to "work anywhere, deliver anytime." Can your data security plan keep mobility from becoming a liability? Learn how to get the most out of today's mobile marketplace.
July 2012- In this age of electronic health records, we look to high-tech computer technology to help us implement privacy and security control for confidential data. However, many privacy incidents and breaches occur because human error and low-tech, rather than high-tech, shortcomings. The exposure of confidential patient information on a computer or smartphone display is a good example and highlights an important and often overlooked privacy and security risk - the issue of visual privacy.
July 2012- The increasing mobility of workers, coupled with the growth of cloud-based services that allow access to data anytime, has forced security professionals to reexamine enterprise defense. On critical are of data-in-use protection is Visual Privacy - the defense of data as it is displayed on a screen. Enterprises need to rethink their security strategy to include the protection of data as it is displayed. This paper examines three in-practice approaches for integrating visual privacy controls ...
A new generation of customized, tightly targeted, and byte-level obfuscated malicious code (malware) disguises its appearance to evade reactive security measures of all kinds, specifically signature-based antivirus solutions. But while each new instance in a malware "family" may appear different, its behavior can't be disguised.
This paper covers the benefits of Symantec SONAR technology and how it takes advantage of this weakness to create a new, final line of defense against even sophisticated, ...
Controlling access to data and applications is vital considering escalating security and privacy concerns. Organizations must prove they have strong and consistent access controls. They also want to ensure that decisions made about user entitlements are in line with their business goals and policies. IBM identity and access management (IAM) governance provides the resources to manage business-specific user access requirements with greater accountability and transparency.
Learn more about our policy-driven approach and end-to-end ...
Today's interconnected organizations are making their systems and applications available to an ever-growing community of online users -- customers, partners, suppliers, etc. This availability comes with the need to securely manage users' permissions and access to sensitive data.
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
June 2012- In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...
June 2012- There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine until remediation is complete.
February 2013- The increasing use of smartphones and tablet computers as business tools has brought organizations and their employees new levels of productivity, flexibility and mobility. IBM offers solutions and strategies for managing both employee-owned and enterprise-owned equipment
When it comes to disasters, the question isn't if, but when they will occur. Ranging from minor power outages to catastrophic floods, disasters more often result from malicious tampering, computer failure, hardware theft, computer viruses, or hacking. Even more common is
the catastrophe of simply deleting a critical file accidentally.
Whatever the cause, if your company's information isn't protected when a serious glitch occurs, the digital assets that drive your business can be ...
With growing data volume, increasing data security breaches, and complex application-performance issues, most enterprises today face significant data management challenges. Keeping inactive data online not only creates security risk but also increases infrastructure and database cost.
Some enterprises are literally throwing away data to minimize complexity and lower these costs. Although there are several better options available to control data growth, data archiving is the best long-term solution to significantly improve application performance ...
Ensuring the accuracy, reliability and quality of your critical business applications has never been more important. Why? Because companies across industries depend on mission-critical enterprise applications to drive their business initiatives.
In turn, those applications rely on relational databases to store and manage the underlying enterprise data. The ability to enhance, maintain, customize and upgrade those sophisticated applications is critical for achieving long-term business goals. Companies are striving to speed the deployment of ...
April 2012- Most companies place a high premium on IT security, and believe they have ironclad protection. However, the toll from cyber-attacks continues to climb. That's because there are gaping vulnerabilities in the way defenses are deployed - firewalls, endpoint security and even protected storage can all be bypassed by attackers. Learn how a data-centric security approach can make data useless to data thieves.
April 2012- Many data breaches occur at companies that already have a data security policy in place. What is the problem? Typically, intrusion detection and other technologies designed to keep intruders out of your system are built to protect against previously known hacking strategies. This approach exposes your IT systems to great risk as new methods of intrusion are constantly being devised. Learn how to protect corporate data with a data-centric encryption strategy.
April 2012- Compared to past approaches Voltage SecureData offers distinct advantages. In addition to the security advantages of FPE and tokenization, integration efforts are reduced to hours and days, instead of months or years as in the past. De-identification of data for testing or other purposes leverages the same data protection used in production. As a true enterprise platform, clients can start with simple applications and expand the use of Voltage SecureData across any number of applications ...
April 2012- As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. In the future, you will encrypt data - both in motion and at rest - by default. By encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services