- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Dell Boomi a Leader in the Gartner Magic Quadrant for iPaaS
- How Are Banks Fighting the War on Fraud Whitepaper
- Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
- The Right Way to Protect Against DDoS Attacks
BPM for Dummies
[ Source: IBM ]
August 2012- Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012- Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011- The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011- In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011- This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012- Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011- Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011- Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011- Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
PCI-Compliant Cloud Reference Architecture authored by Cisco, Coalfire, HyTrust, Savvis and VMware
[ Source: HyTrust, Inc. ]
November 2010- Cisco, HyTrust, VMware, Savvis and Coalfire have collaborated to construct a cloud reference architecture that addresses some of the unique challenges of the Payment Card Industry (PCI) Data Security Standard (DSS). Innovative technologies from Cisco, VMware, and HyTrust are used to implement the cloud architecture with a number of additional security controls to meet the intent of PCI DSS. The reference architecture was implemented in the Savvis lab and the team collaborated with Coalfire, which ...
nCircle Solutions for Automating the Consensus Audit Guidelines Critical Security Controls
[ Source: nCircle ]
November 2010- Securing our federal infrastructure has become one of our nation’s top cyber security priorities. The Consensus Audit Guidelines (CAG) were created to begin the process of establishing a prioritized baseline of information security measures and controls for the Federal Government. Fifteen of the twenty security controls outlined in CAG can be monitored, at least in part, automatically and continuously.
The rapid rate of change present in an environment constantly under attack makes ...
Unraveling Web Malware
[ Source: FireEye ]
September 2009- There has been a rapid rise in the use of web blended threats to exploit client browsers and operating systems. These can lead to infection by bots which can be controlled remotely. Eleven percent of the world’s computers are enmeshed in at least one botnet and 72% of corporate networks with more than 100 computers have an infection.
Obfuscated code and encrypted exploits are increasing in prevalence. The point of these exploits is to ...
Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers: Part 1 of 5
[ Source: Sendmail ]
October 2008- Sendmail’s podcast, “Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers” focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure. This podcast is the first of five editions in this series and is a general introduction to Directory Servers.
Michael Donnelly – a senior messaging architect at Sendmail and expert on Directories, with over 20 years of experience in the computing industry – examines what Directory ...
Does Size Matter? The security challenge of the SMB
[ Source: McAfee ]
September 2008- Just because a business is small, doesn’t mean it’s immune to security threats. Security challenges facing Small and Medium Businesses in North America are on the rise. For businesses of all sizes, viruses, hacker intrusions, spyware and spam can lead to lost or stolen data, computer downtime, decreased productivity, compliance issues, lost sales and even loss of reputation. According to a recent survey conducted by McAfee, many small and medium sized businesses felt ...
XSS (Cross-Site Scripting) Introduction
[ Source: V.A.P.T. ]
April 2008- In this Whitepaper, we will cover the outline of how to prevent XSS attacks, how they work, and why they are so successful. Take a look at why this attack is so popular and how it affects some of the largest corporations in the world.
The Business Case for Managed Security Services
[ Source: Solutionary ]
April 2012- There are a lot of decisions to be made when evaluating Security Information and Event Management (SIEM) products vs. hiring a Managed Security Service Provider (MSSP). This white paper looks at both options and explains when it makes sense to choose one option over the other.
Application Whitelisting Preventing the Advanced Persistent Threat
[ Source: Bit9 ]
April 2010- Zero-Day, Aurora, APT – a lot of different names describe today’s targeted attacks that boast unlimited tenacity and resources. The explosion in media coverage underscores a reality that security professionals have known for some time: the traditional reactive approach of blacklisting known viruses is simply no match for today’s modern malware and advanced threats.
How can you combat these evolving, well-funded threats that continue to outsmart existing defenses? According to Gartner, Application ...
Transforming IT GRC into a Mainstream Business Application
[ Source: TraceSecurity, Inc ]
February 2013- Coping with the complexities of IT GRC is a growing market dilemma for small and medium organizations (SMEs) and a new IT GRC prescription is well overdue - one that provides true enterprise-class capabilities, but without the enterprise burden on resources.
This paper explains the SME information security landscape and how to best leverage an integrated, cloud-based approach to adopt an IT GRC strategy that reveals your organization's risk posture, enforces security policies, ...
IBM Endpoint Manager: Reaping the Benefits of a Unified Approach to Security and IT Operations Management
[ Source: IBM ]
June 2012- In this report, Enterprise Management Associates (EMA) analysts examine how IBM Endpoint Manager's combination of strong endpoint capabilities coupled with the flexibility of a highly adaptable, distributed processing architecture unifies the common objectives of security and IT operations management. Two successful customer use cases demonstrate the efficiency of IBM Endpoint Manager that enables a striking degree of scalability for some of the world's largest, most complex IT environments, while also successfully scaling down to small ...
Advanced Threat Defense Tactics
[ Source: GENERAL DYNAMICS Fidelis Cybersecurity Solutions ]
March 2015- Advanced Persistent Threats (APTs) in the online realm are a painful reality for companies of all sizes, from the largest enterprises down to small and medium-sized businesses (SMBs). Business leaders might be tempted to think that their own organizations are exempt from APTs, or that the security measures they already have in place are adequate to defend against these persistent, methodical attacks. Yet those temptations must be avoided. If your business has something of value ...
Who are you trying to protect?
[ Source: Gemalto ]
August 2014- If we are to progress towards more secure and convenient authentication solutions, we have to start thinking beyond passwords. Multi-factor solutions that operate independent of passwords, are the future. But not all users are created equal. Some need more stringent forms of authentication than others. So who are you trying to protect?
The Right Way to Protect Against DDoS Attacks
[ Source: F5 ]
October 2014- CIOs want harmony. Security directors loathe point products. Network operations won't buy into anything new. CIOs can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on premises with a new cloud component. Read the white paper to learn more.
Case Study: Everbridge Manages Traffic and Security across Global Cloud Providers and Local Data Centers
[ Source: F5 ]
March 2015- Everbridge, a provider of critical communications services, leverages the cloud to ensure its systems are always available and able to handle sudden traffic bursts. By using a unified F5 solution that includes virtual editions, Everbridge can better manage traffic and security within its own data centers, as well as multiple global cloud service providers. This also provides added scalability and decreases overhead costs. Read the case study to learn more.
The Expectation of SSL Everywhere
[ Source: F5 ]
March 2015- SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. The stakes around SSL have been upleveled to the limit. Whether or not it's convenient to admit, it's time for organizations to uplevel their overall security posture to protect this last line of defense. Read this white paper to learn how your organization can properly embrace a higher ...
Next-Generation Network Security: A Buyers' Guide
[ Source: Cisco ]
March 2015- Read this buyers' guide for an in-depth explanation of the factors that impel organizations to look at next-generation security solutions.
Achieve Deeper Network Security and Application Control
[ Source: Dell SonicWALL ]
March 2015- Discover a next-generation firewall solution that combats emerging threats effectively and without compromise while reducing the total cost of ownership (TCO). Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
G2000 Firm Secures Critical Financial Applications and Generates 192% ROI (Forrester)
[ Source: Veracode ]
March 2015- Learn how a global firm secured 400 critical applications and generated an ROI of 192% with cloud-based automation and centralization. The firm previously relied on a traditional on-premises scanning tool, but success was limited because specialized expertise was required to tune and interpret results. As a result, the firm's AppSec program only covered a small fraction of the firm's applications. This Forrester case study includes a detailed financial model showing how the firm leveraged centralized ...
How a Global Manufacturer Secures Its Software Supply Chain
[ Source: Veracode ]
March 2015- A global manufacturer found that over 90% of their vendor applications had critical OWASP Top 10 vulnerabilities. The company now leverages Veracode's automated cloud-based service to audit hundreds of third-party applications per year without requiring access to proprietary vendor source code. It also tracks vendor progress with supplier scorecards from the Veracode platform, and has modified its procurement process to contractually require suppliers to meet its security policies. The company has also dramatically scaled its program ...
Hacking Exposed 7 - Chapter 10: Web and Database Hacking (McGraw-Hill)
[ Source: Veracode ]
March 2015- Read this classic reference text to get into the cyberattacker's mind and understand the latest attack vectors and web application threats. The prerequisite for dealing with cybersecurity is knowledge: download this critical chapter to learn about web application vulnerabilities and hacking techniques; freely-available crawling tools; and countermeasures to protect your web application infrastructure.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services