Evaluating Managed File Transfer in the Cloud: What You Need to Know
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs ......

Evaluating Managed File Transfer in the Cloud: What You Need to Know [ Source: Ipswitch File Transfer ]
December 2012-
As you evaluate Cloud-hosted solutions for secure managed file transfer, you will need to evaluate cloud solutions compared to on-premise hosted solutions, and the tradeoffs of each. And this decision does not need to be "either-or"; for many companies an enterprise solution for managing secure file transfer encompasses both cloud hosted and on-premise options.
This white paper from Osterman Research details advantages to consider for managing file transfer operations in the cloud, and ...
The State of DDoS Protection: Organizations Remain Unprepared for DDoS Attacks [ Source: Neustar ]
December 2012-
Distributed denial-of-service (DDoS) attacks continue to grow in size, complexity and danger. Witness the recent wave of attacks on major U.S. banks, which knocked websites offline, angered customers and took a grave toll on brand reputations. The lessons of those attacks echo the findings of this report: Previously successful DDoS mitigation solutions no longer work.
UBM Tech conducted research with IT professionals who have suffered DDoS attacks. The drastic changes in attack ...
A New Breed of Information Security Leader: The Hyper-Connected Era and What It Means for CIOs and CISOs [ Source: IBM ]
December 2012- 2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?
Consolidated Security Management for Mainframe Clouds [ Source: IBM ]
December 2012- IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
How Does IBM Deliver Cloud Security [ Source: IBM ]
December 2012- Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualised environments from targeted threats and attacks, enabling secure collaboration, protection of the data (isolation, sharing) in a rapid provisioning and deprovisioning environment while experiencing the loss of ...
Intelligent Role Management for Improved Security and Compliance [ Source: IBM ]
December 2012- In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are overly complex and are not suited for business users. To find out how the integrated Role and Policy Modeler component of IBM Security Identity Manager ...
Close Encounters of the Third Kind [ Source: IBM ]
December 2012- This white paper presents the results of a research study on the prevalence of client-side JavaScript vulnerabilities, conducted by the IBM Security (formerly, IBM Rational) application security team. For this study, the researchers used IBM JavaScript Security Analyzer (JSA) technology, which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. This kind of analysis is superior to and more accurate than regular static ...
Your Organization Has Just Been Attacked by Malware - Now What? [ Source: Sourcefire ]
December 2012-
Jumping the gun? Maybe. But odds are it will happen.
Be ready with your Advanced Malware Survival Kit.
Download our Incident Response Brief: 4 keys to effective malware response
From there, access:
• Videos: See the power of malware visibility and control from the network to end-devices
• Special Offer: 100 Free Seats of advanced malware protection
Download the Advanced Malware Survival Kit Now and be prepared before the next attack!
3 Strategies to Protect Endpoints from Risky Applications [ Source: Dell KACE™ ]
November 2012- Cyber criminals have started to look for greener pastures—namely among third-party applications. Reduce the risk profile of PC and server operating systems and protect endpoint security from risky applications. Read the white paper today.
Email As Part of a Business Continuity Strategy: Why always-on-business requires always-on-email [ Source: mimecast ]
November 2012-
Few businesses could function without email, and email provides a critical coordination
tool during an outage, yet due to the cost and complexity of providing true email continuity many businesses do not have business continuity plans that protect email adequately.
Read why continuity and archiving services may prove more cost effective for email than high-availability clustering, especially when considered in the light of continued governance, risk mitigation and compliance.
The Critical Role of Data Loss Prevention in Governance, Risk and Compliance [ Source: mimecast ]
November 2012- This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It does not cover the technologies available for creating and implementing Data Leak Prevention (DLP) solutions in depth, but rather seeks to highlight the issues DLP is designed to solve and how these issues fit into a wider context of information security, compliance and risk.
Three Steps to Mitigate Mobile Security Risks [ Source: Rapid7 ]
November 2012-
Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices present to their corporate data.
This white paper highlights key mobile security risks and describes how pervasive they are based on data from ...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance [ Source: Rapid7 ]
November 2012-
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance.
When you download this free eBook, ...
Complete Storage and Data Protection Architecture for VMware vSphere and Microsoft Hyper-V [ Source: HP ]
November 2012- In this white paper, HP and Veeam Software outline an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft Hyper-V environments. Core components of the architecture are HP LeftHand Storage, HP StoreOnce Backup, and Veeam Backup & Replication software.
IDC Tech Spotlight: Benefits of Unified Endpoint Data Management in Embracing BYOD [ Source: Druva ]
November 2012-
End users now access critical corporate data on personal devices and use consumer-grade web applications for work-related tasks, making it difficult for IT to fulfill one of their most important responsibilities: keep enterprise data secure.
Download the full IDC report to learn the impacts of this trend, as well as the benefits of unifying the often discreet IT functions of data protection, security, storage, and collaboration.
Why You Need to Consider Privileged Access Management (And What You May Not Know About It That You Should) [ Source: Quest Software ]
November 2012-
Access controls that define a specific set of user privileges are well accepted as a security best practice. Why, then, are these same principles so rarely applied to the most sensitive access of all: administrative accounts?
In this ENTERPRISE MANAGEMENT ASSOCIATES® report, you’ll discover common excuses given to justify this oversight. You’ll then see how modern privileged account management solutions provide the control and monitoring capabilities needed to bring privileged access ...
Smart Devices, Smart Security [ Source: Voltage Security ]
November 2012-
Once mostly prohibited by IT, smartphones and tablets—such as Android-based phones and Apple iPads—are now being used by hundreds of millions of employees worldwide to access, transmit and store corporate information in today’s 24x7 business environment. This “extended enterprise” introduces new challenges and complexities for IT.
Not surprisingly, security has emerged as the No. 1 challenge posed by the BYOD trend. Traditional security approaches typically involve perimeter-based security controls such as ...
Are Employees Putting Your Company's Data at Risk? [ Source: Ipswitch File Transfer ]
November 2012- This research report exposes critical risks most organizations face related to how employees transfer files to/from other employees, partners and customers. You will learn the challenges most organizations face today and tips about how to best ensure security of confidential data and information.
Nemertes Research: Mobile Security Challenge Emerges [ Source: Blue Coat ]
October 2012- This report examines the security challenges and requirements for the hybrid fixed and mobile workplace of today and demonstrates how the mix of on-premise and cloud applications in the enterprise needs an array of security solutions directed by a flexible security policy that follows the user, regardless of device or location.
Tolly Report: Anti-Virus Performance in VMWare ESX Virtual Environments [ Source: Symantec ]
October 2012- Symantec Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware ESXi 5 virtual environments vs. Trend Micro Deep Security 8. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning, and during distributed virus definition update
Dennis Technology Labs - Effectiveness in Virtual Environments [ Source: Symantec ]
October 2012- This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.
Symantec Positioned as a Leader in Leading Analyst Firm Magic Quadrant [ Source: Symantec ]
October 2012- Access a complimentary copy of the 2012 Gartner Magic Quadrant for Endpoint Protection Platforms to gain deeper knowledge of the endpoint protection market, learn about factors driving growth and get an unbiased analysis of vendors in this space and their strengths and cautions.
Cerberus: Malware Triage and Analysis [ Source: AccessData Group ]
October 2012- This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...
Cybersecurity in Action [ Source: Guidance Software ]
October 2012-
4 Days, 465 Systems, 3 continents
The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.
Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...
Achieving Compliance in Digital Investigations [ Source: Guidance Software ]
October 2012-
80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.
This ...
How Three Cyber Threats Transform the Role of Incident Response [ Source: Guidance Software ]
October 2012-
“The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System
While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++
Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization
Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers
Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite
