Securing your server and network configurations may be the smartest security work you can do. Why? Continually protected and hardened systems keep your data safe, repel exploits and provide measurable confidence. But it's hard to do. How do you get started? What are the capabilities to look for in an effective solution?
Security Configuration Management For Dummies shows you how to:
• Adopt and implement a security hardening policy
March 2014- This booklet/poster takes you step-by-step through the 20 Critical Security Controls, with an additional section that focuses on the first four fundamental controls. A convenient scorecard lets you rank your specific needs against NSA rankings.
March 2014- This anthology of blog posts from Tripwire's award-winning blog, "The State of Security" provides five cybersecurity experts' views on vulnerability management."
May 2012- Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized, and only providing value around audit time. How useful is a 100-page vulnerability report to an operations person trying to figure out what to fix next? But the tide is definitely turning?there is now a clear shift from a largely compliance-driven orientation to a more security-centric view. It?s widely acknowledged that compliance provides a low bar for security, and it just ...
In almost every year since 2000, the Internet Crime Complaint Center has reported an increase in cybersecurity crime reports by individuals and organizations. Over the last dozen years, the number of attacks reported in the United States seems to grow consistently over time. After examining this trend, the question arises: Is there anything an organization can do to stop these attacks from occurring and protect their critical information systems from intruders?
Business leaders need ...
March 2014- Measuring and managing the security risk associated with information and information technology remains one of the most challenging and elusive problems faced by all levels of an organization. The challenge of how to measure, and therefore how to manage, risk is ever-present and top of mind for information security professionals. Unfortunately, most of the tools for vulnerability and risk management that exist today do not provide a suitable metric and consequently do not improve an ...
Most organizations understand the critical role that vulnerability management (VM) plays in helping them meet compliance requirements,ensure security and reduce risk. However, many organizations discover,only after investing in a solution, that it doesn't properly address their needs. Avoiding this costly mistake can be difficult though, because at first glance many VM solutions appear similar.
This guide helps you objectively choose a new or replacement VM solution by teasing out the real ...
September 2013- To better understand how organizations are managing risk through security and compliance, McAfee retained Evalueserve to conduct an independent assessment of the factors organizations that use risk and compliance products face in 2012. This is the third in a series of global studies that highlights how IT decision-makers view and address the challenges of risk and compliance management in a highly regulated and increasingly complex global business environment.
September 2013- This paper explains how a deployment automation framework can streamline release operations and increase business agility. The document describes the benefits of Deployment Automation. In addition, the whitepaper contains a formula for calculating the return on your investment (ROI).
August 2013- Powered by an intelligent agent architecture, Endpoint Manager delivers real-time visibility and control to arm IT operations with near zero-day protection across heterogeneous environments and wherever laptops roam. It includes leading analytics capabilities that provide insights for hardening the infrastructure against attacks to the network, servers and endpoints.
May 2013- You've found a virus running on your server. You discover logon IDs on your network that don't belong. A hacker has your credit card database. Any one of these is enough for you to hit your panic button and lose it - don't. In this eBook, get the steps you need to take to provide immediate aid to hacked systems, infected workstations, and other IT security disasters. This ultimate first aid kit for system admin ...
Protecting endpoints from various threats is perhaps the single most critical function for any IT department. Given the still voluminous quantity of spam that hits corporate email servers, the growing threat from phishing and advanced persistent threats, and the increasing number of physical platforms and Web-based applications that have access to corporate data resources, protecting these critical resources and platforms should be at the top of virtually IT decision maker's "must-do" list.
Access controls that define a specific set of user privileges are well accepted as a security best practice. Why, then, are these same principles so rarely applied to the most sensitive access of all: administrative accounts?
In this ENTERPRISE MANAGEMENT ASSOCIATES® report, you’ll discover common excuses given to justify this oversight. You’ll then see how modern privileged account management solutions provide the control and monitoring capabilities needed to bring privileged access ...
October 2012- This report outlines Forrester's future look for mobile security and operations. This report is designed to help security and risk (S&R) and infrastructure and operations (I&O) executives understand and navigate the major business and IT trends that will affect the development of a future-proof mobile support strategy.
October 2012- Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
October 2012- The cloud is supposed to be a "cure-all", but it also creates numerous new security issues for SMBs. Download this techbrief for 7 tips you must have before you commit to any service!
Learn how you build a secure network and growth-ready network that is as agile as your business. With a growth-ready network, small business can put new technologies to work on their schedule - and the rapid pace of doing business in the Internet age will never be too fast.
Sponsored by: HP and Intel®
This white paper reviews the impact of cloud computing on data center networks and describes HP's approach to building simpler, more secure and automated networks that fully meet the stringent performance, security, reliability and agility demands of the new data center in the Cloud.
November 2011- How are technology leaders adapting to the change and complexity that mark today's economic landscape? Read this white paper to identify the 4 patterns, or mandates, employed by CIOs when leveraging business and information technology to innovate. Learn how each pattern indicated a distinct approach to IT leadership, and are derived from specific organizational needs.
2011 anti-spam email security whitepaper. Today's enterprise anti-spam solutions typically deliver 95% effectiveness. Unfortunately, that's not good enough. A border-line attack that gets through a 5% gap in defenses could cost your organization millions of dollars in terms of lost business, exposure to privacy threats, and brand loyalty.
Recent attacks show that spammers and scammers are determined to find their way through any gap, however slight, in an enterprise's defenses. They're exploiting a variety of tactics ...
February 2011- On a smarter planet, intelligence is infused into the products,systems and processes that comprise the modern world. Theseinclude the delivery of services; the development, manufactur-ing, buying and selling of physical goods; and the way peopleactually work and live. Nowhere may this transformation bemore evident than in the creation of smarter products.
Infusing intelligence into the way cities work. The interconnected nature of people, resources and environments is driving a revolution in how and where people live. By 2050, city dwellers are expected to make up 70 percent of the Earth’s total population1—or 6.4 billion people—equal to adding seven New York’s to the planet annually.
To attract the best and brightest citizens and businesses, which bring the flow of economic capital, cities must compete ...
Your business is challenged with meeting the demand for continuous availability while also effectively managing enormous amounts of information that continue to grow, much of it online, and often with no offline option for conducting business. When your systems are down, you risk more than loss of revenue and productivity: you jeopardize business-critical data as well as damage to your brand.
Read this IBM white paper to learn how to develop a cost-effective ...
November 2010- The ITIC 2009 Global Server Hardware and Server OS Reliability Survey polled C-level executives and IT managers at 400 corporations from 20 countries worldwide. IBM AIX UNIX running on the Power or P series servers scored the highest reliability ratings among 15 different server OS platforms, including Linux, Mac OS X, UNIX and Windows.
January 2010- More and more companies are relying on Web-based applications to provide online services to their employees, to support e-commerce sales and to leverage portals. All of these applications are designed to help staff better communicate with customers, partners and suppliers. However, as the number and complexity of Web applications have grown, so have the associated security risks. With increasing frequency, incidents of Web application breaches resulting in data theft are popping up as front-page news. ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services