Mission critical defense
Attackers don't work in silos. To defend against them, your defenses can't be siloed either. The teams, tools, and solutions you use in the response ......
We've all seen the reports about what goes wrong when proper controls are not implemented while storing and transferring data. Large enterprises face messy notifications, customer dissatisfaction and, in many cases large fines. In fact, a data breach in the U.S. comes with an average price tag of $5.5 million, according to a 2011 Ponemon Institute study.
This paper from Imation Mobile Security explains when compliance alone may not offer the protection enterprises need ...
February 2013- Typical web applications are protected with single-factor authentication: a user name and password. These credentials, in addition to being difficult to manage, leave sensitive data and applications vulnerable to a variety of common attacks. As enterprises adopt more cloud applications, addressing this threat will become critical. Unlike older on-premises applications, cloud applications are accessible to anyone on the public Internet. Multifactor authentication (MFA) is designed to protect against the range of attacks that rely on ...
February 2013- Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee ePolicy Orchestrator provide IT Admins with powerful and effective tool for identifying and remediating vulnerable systems.
February 2013- Information security based on regulatory compliance stipulations cannot keep up with today's sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, "Real-time Risk Management."
February 2013- Taking a risk-based approach to vulnerability lifecycle management is becoming the norm for vulnerability assessment vendors. This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability lifecycle management perspective.
February 2013- Vulnerability assessment vendors compete on management features, configuration assessment, price, reporting and integratin with other security products. Buyers must consider how VA will fit into their overal vulnerability management process when evaluatiing VA products and services.
February 2013- Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands for other IT projects and investments they face. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
February 2013- As long as there is software, there will be software vulnerabilities. And wherever there are vulnerabilities, you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
February 2013- Up until now, your view of risk while monitoring your network has been incomplete. This white paper discusses a new, innovative approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
February 2013- Gone are the days when majority of corporate employees worked in the office and were statistically mapped to their applications and resources which all ran behind the firewall. Today, not only are applications running on the LAN/corporate data center and being delivered from cloud-based networks. These cloud resources might not have access to a corporate directory for employee validation. In addition, today's workforce is highly distributed; using a multitude of different access devices, yet ...
February 2013- Companies are in high alert to fight off Distributed Denial of Services (DDoS) attacks that can halt business and amount to a costly burden on companies and customers. DDoS attacks are increasing in volume, frequency, and sophistication, and they are targeting every level in the data center. Smart organizations are moving to defend not only their network, session, and application layers, but also their business logic and database tiers as well. In defense, today's enterprises ...
February 2013- The firewall is, and has been, the primary foundation around which conventional network security architectures are built. But the conventional firewall is beginning to show its limitations in detecting and repelling modern attacks. Diverse attacks involving multiple layers of the network stack are causing firewall failures with alarming frequency. As a result, traditional firewall services alone are insufficient for detecting attacks and subsequently preventing business disruption. The new application delivery firewall technology provides enforcement of ...
Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access to corporate data resources, protecting these critical resources and platforms should be at the top of virtually IT decision maker's "must-do" list.
The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails.
Historically, phishing attacks targeted end-users with attackers going after credentials to financial accounts. But modern phishing attacks have evolved toward targeting sensitive corporate data as evidenced by the high profile data breaches targeted at diverse organizations including RSA ...
Learn how Big Data analysis techniques gives enterprises the data security they need to withstand today's highly customized inbound attacks.
Enterprises today are exposed to a range of IT security threats, from basic annoyances such as auto-emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardize the security of the enterprise. As threats have evolved over time, new ...
Ensuring data privacy in compliance with government regulations and consumer protection laws presents a complex set of challenges for financial firms. Coupled with the rising sophistication in security threats, many industries are under regulatory fire in demonstrating accountability and addressing compliance requirements in accordance with federal and state laws. How an organization is able to store and manage their data, including email, has a high impact on regulatory compliance.
Read this white paper ...
Healthcare organizations face three major IT security and compliance challenges:
Regulations such as HIPAA are getting stricter and enforcement actions are becoming more common and costly.
Hackers and criminal syndicates are targeting healthcare organizations with new forms of intrusive IT attacks that steal valuable data.
As in other industries, healthcare is undergoing an IT revolution enabled by consumer-class mobile devices like iPads and Android phones. While smartphones and tablets give healthcare ...
February 2013- New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present. They need threat intelligence about the latest tools, techniques, and procedures in use by the attacker community, and the ability to track and manage the responses initiated as a result of the issues they identify.
February 2013- Esse é um excelente momento, embora desafiador, para ser profissional de segurança. As ameaças à segurança estão se tornando mais agressivas e vorazes. Os governos e os órgãos do setor estão se tornando mais precisos em relação à conformidade. Combinado a ambientes de TI exponencialmente mais complexos, o gerenciamento de segurança está ficando cada vez mais ...
February 2013- A infraestrutura do RSA Security Analytics: oferece arquitetura modular para coleta distribuída, é baseada em metadados para fornecer indexação, armazenamento e capacidade de pesquisa eficientes. Utiliza a infraestrutura do RSA NetWitness para análise lógica e investigações, inclui o warehouse que fornece análise intensiva e arquivamento de longo prazo.
February 2013- Microsoft® Active Directory® Rights Management Services (AD RMS) provides protection to digital documents that meet enterprise and governmental security governance requirements. Since Microsoft's support of AD RMS protects Microsoft Office® documents only, Microsoft provides a RMS Software Development Kit (SDK) for software companies to extend AD RMS support beyond Office documents. Read more now
February 2013- While IT managers canít predict when disaster will strike, they can take steps to ensure that service will be restored as quickly as possible when it does. Raritanís Business Continuity and Disaster Recovery Solutions helps IT staff to quickly, efficiently and accurately troubleshoot, diagnose and repair post-disaster system failures.
February 2013- While many organizations have employed smart card identification to enhance their physical security infrastructure, data centers in particular can benefit greatly from the two-factor authentication that a smart card inherently provides to the logical realm. When seeking a smart card-enabled KVM system, choose not only a solution that fulfills the basic requirement of supporting PKI authentication to multiple servers from a single location, but also one that makes the necessary KVM feature adjustments to enable ...
To ensure the secure transmission of classified and secret information, the U.S. Government has mandated that beginning April, 2013 all access to military, intelligence, and other classified systems will require the use of a limited-access computer network Secret Internet Provider Network (SIPRNet) token.
Even after organizations upgrade their systems for SIPRNet token access and issue hardware tokens, complying with the DoD mandate still poses significant challenges: How can authorized users quickly and securely ...
January 2013- A secure cloud is attainable. In fact, industry luminaries David Hunter of VMware and Arthur Coviello of EMC say clouds can be more secure than physical infrastructure. These professionals explain how to keep your cloud secure and the security solutions offered by VMware and RSA.
January 2013- With the introduction of BYOD and its associated threats, Network Access Control has emerged as a compliance-critical solution. Discover how NAC policies and approaches can secure guest devices and mitigate the risk of BYOD access to the enterprise.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality
Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Social Business, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Internet Policy
Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems
Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention
Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications
Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization
More Security Resources
Mission critical defense