Sort results by: Published date | Company name
Showing items 1-25

Consolidate and Simplify Your Security Environment [ Source: SwishData ]

July 2014- How can federal organizations stay ahead of today's sophisticated, fast-changing threats, particularly when budgets are tight? It's not that agencies lack protections. Most have put in place strong perimeter defenses and other security tools, but they cannot simply stand pat against threats that are constantly devising new ways to evade defenses, compromise networks, and exfiltrate data. Agencies must be equally agile in countering evolving cyber threats. Doing so requires that they find ways to ...

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions [ Source: Trend Micro ]

July 2014- This Trend Micro-commissioned profile of North American, European, and Asia Pacific IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester’s own market data, and a custom study of the same audience.

NSS Labs Report: Breach Detection Systems Comparative Analysis [ Source: Trend Micro ]

July 2014- In recent NSS Labs testing, Trend Micro Deep Discovery scored the highest in breach detection of all products, including those from AhnLab, Fidelis, FireEye, Fortinet, and Sourcefire.

Download NSS Labs' 2014 Security Value Map (SVM) for Breach Detection Systems to compare test results and see why Deep Discovery should be on your product short list.

3 Questions to Ask Your DNS Host [ Source: Neustar ]

June 2014- Learn the three key questions you should be asking your DNS host when it comes to protection against DDoS Attacks.

White Book : Cloud Security - The Definitive Guide to Managing Risk in the New ICT Landscape [ Source: Fujitsu America Inc. ]

June 2014- Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organizations, the journey to cloud is no longer question of "if" but rather "when", and a large number of enterprises have already travelled some way down this path.

However, there is one overwhelming question that is still causing many CIOs and their colleagues to delay their move to cloud: Is cloud computing secure? As many unwary businesses have ...

5 Reasons to Converge Video Surveillance onto the Corporate IP Network [ Source: Allied Telesis ]

June 2014- With the evolution of IP surveillance technology, the emphasis has moved from simple monitoring of video footage to intelligent systems that are capable of identifying abnormal events or monitoring behaviour. As intelligence increases in these systems, so too do the applications for this technology. Consolidating all applications within an organisation onto a single infrastructure provides many benefits but can also pose many challenges. To learn more about how to overcome these challenges and make the ...

The Insider Threat: Detecting Indicators of Human Compromise [ Source: Tripwire ]

June 2014- Your organization's greatest asset is also its greatest risk. The employees, contractors and trusted business partners you rely on to keep your organization running can also cause it the most damage. A malicious insider can use authorized credentials to do unauthorized things, bring your network down or repeatedly steal data from your organization without being detected.

Learn about the Insider Threat Kill Chain and what you can do to protect your organization from ...

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks [ Source: Neustar ]

June 2014- It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too-whether you use Neustar, another provider or your in-house team to ...

10 Things Your Next Firewall Must Do [ Source: Palo Alto Networks ]

June 2014- For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions your ...

Security Configuration Management For Dummies [ Source: Tripwire ]

May 2014- Securing your server and network configurations may be the smartest security work you can do. Why? Continually protected and hardened systems keep your data safe, repel exploits and provide measurable confidence. But it's hard to do. How do you get started? What are the capabilities to look for in an effective solution?

Security Configuration Management For Dummies shows you how to:

• Adopt and implement a security hardening policy

&...

Identity-Centric Security: Enabling and Protecting the Business [ Source: CA Technologies ]

June 2014- IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant-today's IT must deal with highly distributed identities across the entire business environment that come from many sources-applications, systems, social media, etc. In addition, mobile employees and customers are changing the face of business, and redefining the challenge of ...

Privileged Accounts and Passwords: Risk Management in Civilian Agencies [ Source: Dell Software ]

June 2014- Learn how IT solutions can be used to mitigate risk by reducing requirements and implementing tighter controls on privileged accounts.

Connected Security for FICAM and SICAM with Dell One Identity Solutions [ Source: Dell Software ]

June 2014- Dell solutions map to all areas of the FICAM and SICAM frameworks: Credential, identity, and access mgmt, federation, and auditing & reporting.

Adding Extra Security to Cloud Storage [ Source: Sophos ]

May 2014- Many companies take a restrictive approach to public storage services such as Dropbox by applying web filtering to block access or by applying application controls to prevent cloud storage applications from being installed.

Download this whitepaper and find out how applying data encryption everywhere enables users to manage access to the cloud without placing data or businesses at risk.

Encryption Buyers Guide [ Source: Sophos ]

May 2014- Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from attackers — yet many organizations have shied away from comprehensive encryption because the technology was too complicated or onerous for end users. But things are changing.

This guide will help you:
- Examine the capabilities to look for when evaluating endpoint encryption solutions
- ...

Regulations and Standards: Where Encryption Applies [ Source: Sophos ]

May 2014- Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether it's PCI DSS, SOX, HIPAA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

This whitepaper describes the different types of data under regulation and offers best practices for implementing appropriate encryption technologies. Download this whitepaper and learn:

• Tips on protecting your data in today’s complex security landscape
• How to ...

White Paper: Getting Real About Big Data and Security Management [ Source: RSA ]

May 2014- Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.

Security Brief: Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats [ Source: RSA ]

May 2014- To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.

Analyst Report: ESG Big Data Security Analytics Era is Here [ Source: RSA ]

May 2014- Big data security analytics is no longer a visionary idea - leading enterprises recognize that their immediate security requirements demand this type of solution.

White Paper: Changing the Security Monitoring Status Quo [ Source: RSA ]

May 2014- The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.

Solution Brief: Implementing a Security Analytics Architecture [ Source: RSA ]

May 2014- New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.

Combating Digital Fraud [ Source: RSA ]

May 2014- Combating digital fraud has become a business issue and presents risk for any organization with online operations. Gain perspective from CIOs on what organizations can do to prevent fraud in digital commerce.

The Industrialization of Fraud [ Source: RSA ]

May 2014- Understanding the industry of fraud and its impact on global businesses is critical to defend against the growing sophistication of cyber threats. Learn how organizations are using dynamic, intelligence - driven techniques to redefine fraud risk.

Holding the Fort-Securing Your Network with App-Aware Firewall Testing [ Source: Spirent ]

May 2014- The news is littered with stories of enterprises that have suffered costly downtime and damaging lawsuits as a result of security breaches. Even high-profile names such as LinkedIn, Sony, and RSA are not immune. Lack of security is costly, but how much should an organisation spend to address their security issues?

When it comes to security, you spend money to lower risk - much like spending money on the legal department to reduce ...

Running on Faith-The Risk of Inadequate Network Testing [ Source: Spirent ]

May 2014- In many organisations, network infrastructure testing is neglected or overlooked. Yet Gartner estimates low-end computer network downtime costs $42,000 per hour. For a large company, the cost could be over ten times that.

In 2011, Sony Playstation's network was compromised – exposing the personal information of 77 million users. This created a 24-day outage and cost Sony over $24 billion. The same year an outage left Blackberry users without services for four days - crippling RIM's competitive position.<...

Next 25