Sort results by: Published date | Company name
Showing items 1-25

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions [ Source: Trend Micro ]

July 2014- This Trend Micro-commissioned profile of North American, European, and Asia Pacific IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester’s own market data, and a custom study of the same audience.

NSS Labs Report: Breach Detection Systems Comparative Analysis [ Source: Trend Micro ]

July 2014- In recent NSS Labs testing, Trend Micro Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire.

Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should be on your product short list.

3 Questions to Ask Your DNS Host [ Source: Neustar ]

June 2014- Learn the three key questions you should be asking your DNS host when it comes to protection against DDoS Attacks.

The Insider Threat: Detecting Indicators of Human Compromise [ Source: Tripwire ]

June 2014- Your organization's greatest asset is also its greatest risk. The employees, contractors and trusted business partners you rely on to keep your organization running can also cause it the most damage. A malicious insider can use authorized credentials to do unauthorized things, bring your network down or repeatedly steal data from your organization without being detected.

Learn about the Insider Threat Kill Chain and what you can do to protect your organization from ...

2014 Neustar Annual DDoS Attacks and Impact Report: A Neustar High-Tech Brief [ Source: Neustar ]

June 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as ...

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

June 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

10 Things Your Next Firewall Must Do [ Source: Palo Alto Networks ]

June 2014- For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions your ...

Take Charge of Security in a Hyperconnected World [ Source: RSA ]

May 2014- Read how organizations can improve breach readiness and cyber security maturity and see recommendations for areas with greatest opportunity for improvement.

How Strong is Your Malware Testing? [ Source: Spirent ]

May 2014- Malware is a large and growing problem - with an estimated 32% of computers worldwide infected in 2012. Worryingly, many of those infected computers would have been on networks protected by anti-Malware security measures.

Malware, which is short for malicious software, covers a broad category of hostile software. It is used to disrupt computer operation, gather sensitive information or gain access to private computer systems. Although advanced security systems can detect and prevent malware, they ...

VM Article Anthology Vol. 1: Reduce Your Risk from Vulnerabilities and Threats [ Source: Tripwire ]

March 2014- This anthology of blog posts from Tripwire's award-winning blog, "The State of Security" provides five cybersecurity experts' views on vulnerability management."

HawkEye G: The Active Defense Grid [ Source: Hexis Cyber ]

May 2014- HawkEye G is a dynamic active defense system designed to leverage existing security assets while providing advanced cyber security analytics and automated countermeasure techniques. The combination of the traditional signature-based and new behavior-based heuristics leads to heightened awareness of standard network activity and deviations that could indicate a potentially disastrous situation. Understanding the full threat and defense landscape is crucial for cyber security mitigation and the HawkEye G team has invested the time and resources ...

Five Things To Do After An Attack The Unique Challenges of Dealing with an Advanced Persistent Threat [ Source: Hexis Cyber ]

May 2014- After an organization been hacked, reducing the amount of time an APT lives within the environment is paramount.

To get the job done organizations must deploy a methodical approach that includes steps to detect/identify, contain - or perhaps not, and remove/recover from the attack as quickly as possible. But the process can't stop there. Attackers are increasingly creative in their methods of attack. To truly gain an advantage against attackers, security ...

Mitigating Targeted Attacks Requires an Integrated Solution [ Source: Trend Micro ]

May 2014- Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today's security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, ...

2014 The Danger Deepens - Neustar Annual DDoS Attacks and Impact Report [ Source: Neustar ]

May 2014- For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Larger attacks are more common, but most attacks are still less than 1 Gbps. More than half of attacked companies reported theft of funds, data or intellectual property. Read the full report to learn how DDoS ...

KuppingerCole Leadership Compass: Identity Provisioning [ Source: Dell Software ]

May 2014- Identity Provisioning is still an important part of the Identity and Access Management market. That's why the field is crowded with vendors claiming to have the solution your business needs. But which one is right for your company?

This Leadership Compass delivers an overview of those market segments. Learn more about established vendors, smaller or regional vendors with good growth potential, and which vendors your company should take a close look at when ...

KuppingerCole Leadership Compass: Access Governance [ Source: Dell Software ]

May 2014- Access Governance is a fast-growing component in the Identity and Access Management market - so trusting a solution to manage it is crucial for the success of your business.

In this white paper, see why Dell One Identity Manager is identified as an Overall Leader in the KuppergerCole Leadership Compass: Access Governance report. You'll also get a detailed overview and analysis of the Access Governance market segement, and the solutions available in it.

IAM for the Real World: Identity Governance eBook [ Source: Dell Software ]

May 2014- Managing identity and access across the enterprise is difficult enough, and even simple provisioning can be tough. Factor in regulating compliance and navigating complex IT and user environments, and you?re looking at pretty sizable challenge.

In this eBook, discover best practices to solve your identity governance challenges. Topics include:

• A comprehensive view of governance that covers not only application access, but also data and privileged accounts.

• The key ...

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems [ Source: Dell Software ]

April 2014- Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common.

Intrusion prevention systems (IPS) are designed to prevent known attack traffic patterns from penetrating systems on the network. But there’s an inherent problem with the technology, since it can block only the attacks it sees and is already familiar with. If malicious code is cleverly disguised, it can slip ...

Guarding The Castle: The Strategies and Tools of Cybercriminals and How To Defeat Them [ Source: Dell Software ]

April 2014- Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. You need to understand your enemies before you can defeat them. This e-book will teach you why it is important that you know how you can secure your network every minute of the day against all types of malware, with a high performance firewall that protects against the latest global threats.

Find out ...

Anatomy of a Cyber-Attack [ Source: Dell Software ]

April 2014- Do you know how to keep cyber-criminals out of your network? Learn how to protect your organization from emerging threats in our eBook, "Anatomy of a Cyber-Attack."

Fight Malware, Malfeasance and Malingering [ Source: F5 ]

April 2014- Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it's been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also changing in ways that challenge traditional enterprise security. If not managed effectively, all of these issues have the potential to be very costly for the ...

How to Fill the Threat Management Gateway Void [ Source: F5 ]

April 2014- The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it's important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and appropriate web access. Combining comprehensive features and functionality with superior scalability and performance, F5 Secure Web Gateway Services are uniquely positioned to provide the best ...

The New Art of War: 2014 Targeted Attacks Study [ Source: Proofpoint ]

April 2014- How to Detect, Predict and Eliminate Advanced Targeted Threats From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically.

The 2014 Targeted Attacks Study looks at the specific threats organizations face today; where traditional security approaches are failing; and what advanced tools organizations are ...

Hidden Lynx - Professional Hackers for Hire [ Source: Symantec ]

December 2013- Take an in-depth look at the Hidden Lynx group, their targets, motivations, capabilities and attack strategies.

Protecting PoS Environments Against Multi-Stage Attacks [ Source: Symantec ]

March 2014- Securing your credit card data and PoS environment from attacks requires multiple layers of protection.

Next 25