CoreTrace

Displaying 1-9 of 9 results

  • White Papers // Sep 2009

    Regulatory Compliance: Protecting PCI Systems and Data

    The Payment Card Industry (PCI) computer systems are continually under attack due to the importance of the information they protect. In response to this threat, the PCI has produced an excellent series of process and security tool requirements known as the Data Security Standard (DSS). The DSS identifies a series...

    Provided By CoreTrace

  • White Papers // Aug 2009

    Malicious Software Prevention for NERC CIP-007 Compliance: Protective Controls for Operating Systems and Supporting Applications

    Utilities attempting to meet the North American Electric Reliability Corporation "Critical Infrastructure Protection" (NERC CIP) requirements have encountered an unexpected, but very serious conundrum in the cyber-security realm: should they strive to meet the spirit or letter of the regulations? The potential penalties are compelling, up to $1,000,000 per day...

    Provided By CoreTrace

  • Webcasts // Aug 2009

    Breaking the Cycle of Ineffective Anti-Malware

    EMA analysts are known for their willingness to give their honest assessments and opinions regardless of vendor agendas. The presenter will outline his candid thoughts on the few questions.

    Provided By CoreTrace

  • White Papers // May 2009

    Application Whitelisting and Energy Systems - A Good Match?

    This white paper is broken into three basic sections. With any given security technology, the strength of the solution is always in the implementation. The first section describes the short history of application whitelisting and provides detailed perspective on how the technology works. The second section discusses the use of...

    Provided By CoreTrace

  • Webcasts // Feb 2009

    Securing SCADA Systems to Meet Requirements Like NERC CIP

    Need to secure SCADA systems to meet critical compliance requirements like NERC CIP? The attendee will learn how from a process control security expert and one of the authors of the NERC CIP requirements!.

    Provided By CoreTrace

  • Webcasts // Jan 2009

    Cyber-Security Strategies in an Era of Change

    This webcast throws light on cyber security strategies in an era of change.

    Provided By CoreTrace

  • Webcasts // Jan 2009

    The Real World of Real Customers: Click Forensics Solves the Security Mystery

    The presenter will give an insider's perspective on the trials and tribulations of the industry leader in online traffic quality management establishing effective business processes around IT security. The attendee will learn from what went right during their early security experiences, and more importantly, what went wrong. The attendee will...

    Provided By CoreTrace

  • White Papers // Jul 2008

    Application Whitelisting: A New Security Paradigm

    With a defense-?in-?depth strategy in place complete with an Endpoint Security v1.0 (i.e., blacklisting) antivirus solution, personal firewall, and up-to-date security patches - endpoint security is covered, right? It shouldn't matter that the web is the preferred malware attack vector and that in 1Q08 a new infected webpage was discovered...

    Provided By CoreTrace

  • White Papers // Jul 2008

    BOUNCER by CoreTrace: Provides True Endpoint Security With Rapid Breakeven

    This paper presents an illustrative analysis of the Total Cost of Ownership (TCO) of Endpoint Security v1.0 vs. BOUNCER's Endpoint Security v2.0 to provide a framework for discussion of BOUNCER's Return On Investment (ROI). The analysis in the main body of the paper presents the hard costs; the commentary on...

    Provided By CoreTrace

  • Webcasts // Aug 2009

    Breaking the Cycle of Ineffective Anti-Malware

    EMA analysts are known for their willingness to give their honest assessments and opinions regardless of vendor agendas. The presenter will outline his candid thoughts on the few questions.

    Provided By CoreTrace

  • Webcasts // Feb 2009

    Securing SCADA Systems to Meet Requirements Like NERC CIP

    Need to secure SCADA systems to meet critical compliance requirements like NERC CIP? The attendee will learn how from a process control security expert and one of the authors of the NERC CIP requirements!.

    Provided By CoreTrace

  • Webcasts // Jan 2009

    Cyber-Security Strategies in an Era of Change

    This webcast throws light on cyber security strategies in an era of change.

    Provided By CoreTrace

  • Webcasts // Jan 2009

    The Real World of Real Customers: Click Forensics Solves the Security Mystery

    The presenter will give an insider's perspective on the trials and tribulations of the industry leader in online traffic quality management establishing effective business processes around IT security. The attendee will learn from what went right during their early security experiences, and more importantly, what went wrong. The attendee will...

    Provided By CoreTrace

  • White Papers // Jul 2008

    Application Whitelisting: A New Security Paradigm

    With a defense-?in-?depth strategy in place complete with an Endpoint Security v1.0 (i.e., blacklisting) antivirus solution, personal firewall, and up-to-date security patches - endpoint security is covered, right? It shouldn't matter that the web is the preferred malware attack vector and that in 1Q08 a new infected webpage was discovered...

    Provided By CoreTrace

  • White Papers // Aug 2009

    Malicious Software Prevention for NERC CIP-007 Compliance: Protective Controls for Operating Systems and Supporting Applications

    Utilities attempting to meet the North American Electric Reliability Corporation "Critical Infrastructure Protection" (NERC CIP) requirements have encountered an unexpected, but very serious conundrum in the cyber-security realm: should they strive to meet the spirit or letter of the regulations? The potential penalties are compelling, up to $1,000,000 per day...

    Provided By CoreTrace

  • White Papers // Jul 2008

    BOUNCER by CoreTrace: Provides True Endpoint Security With Rapid Breakeven

    This paper presents an illustrative analysis of the Total Cost of Ownership (TCO) of Endpoint Security v1.0 vs. BOUNCER's Endpoint Security v2.0 to provide a framework for discussion of BOUNCER's Return On Investment (ROI). The analysis in the main body of the paper presents the hard costs; the commentary on...

    Provided By CoreTrace

  • White Papers // Sep 2009

    Regulatory Compliance: Protecting PCI Systems and Data

    The Payment Card Industry (PCI) computer systems are continually under attack due to the importance of the information they protect. In response to this threat, the PCI has produced an excellent series of process and security tool requirements known as the Data Security Standard (DSS). The DSS identifies a series...

    Provided By CoreTrace

  • White Papers // May 2009

    Application Whitelisting and Energy Systems - A Good Match?

    This white paper is broken into three basic sections. With any given security technology, the strength of the solution is always in the implementation. The first section describes the short history of application whitelisting and provides detailed perspective on how the technology works. The second section discusses the use of...

    Provided By CoreTrace