eEye Digital Security

Displaying 1-23 of 23 results

  • Case Studies // Sep 2009

    Brazil's Credit Union SICREDI Selects Eye's Retina Scanner to Tame Its Network Security Issues

    SICREDI, which has branches across central and southern Brazil, serves approximately 1.5 million customers. While SICREDI is considered as having a fairly mature security posture versus other banks in South America, the credit union knew that it could be at risk if it didn't continue to bolster its security profile....

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    SecureIIS Web Server Protection Guarding Microsoft Web Servers: When Bad Things Happen to Good Web App Servers

    Off late businesses require an added layer of protection to ensure that their Microsoft Internet Information Services (IIS) Web Server farms remain running without interruption even if a hacker mounts an attack, or the IIS Server is hit with an indiscriminate worm like CodeRed or Nimda. Further, this solution must...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Behind the Scenes Security: eEye in Focus

    The eEye / Norman partnership is a strong one. Norman was chosen as the only anti-virus to be utilized within Blink Endpoint Security, regarded as one of the strongest host-based protection suites on the market. Norman was selected for its unique ability to identify malware via generic sandbox methods while...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    eEye Digital Security Technical Brief: Remote and Mobile User Protection

    In today's interconnected and dynamic workplace, organizations rely on a large part of their workforce working remotely from corporate offices. This creates a situation where networks are driven by computing assets flowing in and out of network perimeters, with the need to provide remote assets access to the internal network....

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Best Practices for Securing Remote and Mobile Devices

    As the number of mobile and remote workers has exploded over the past few years, so too have the security risks they pose. With the rise in new and blended threats that use multiple vectors of attack, these workers are increasingly vulnerable. They also pose a growing threat to the...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    eEye Digital Security Technical Brief: Using Policy Enforcement to Enforce Security Standards

    In spite of advances made in the world of network security, a large percentage of security incidents are still being attributed to the "Internal threat" - end users, responsible for misconfiguring devices and programs, disclosing proprietary business information, or knowingly or unknowingly propagating malicious code. A recent study performed by...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Blink: Protection From the Threats of Today and Tomorrow

    A war is being waged against the desktop. Attacks against desktops within home and business networks occur every day, all in an attempt to gain unrestricted access to these systems. Attackers are smarter and more potent than they were in the past, many times being driven by stated intentions or...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Retina Network Security Scanner - The Need for Vulnerability Assessment & Remediation: What My CIO Needs to Know

    While it's no secret that identifying and correcting network security holes is critical to protecting any business from harmful attacks, the process of vulnerability assessment and remediation often gets overlooked as a critical component of sound security practices. Because it is an ongoing process, many companies avoid proper vulnerability auditing...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Retina Network Security Scanner: Intrusive Vs. Non-Intrusive Vulnerability Scanning Technology

    There are two methodologies used for performing vulnerability assessment regardless of patch assessment or compliance verification. One philosophy revolves around the need to penetrate a system to prove its vulnerability and the other uses available information to postulate the status of the vulnerability. Longstanding discussions have centered on the merits...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    What Every CIO Needs to Know About HIPAA Compliance

    Compliance with HIPAA is mandatory and violators face up to $250,000 in fines and jail time of up to 10 years. HIPAA regulations are intended to protect such data as a patient's medical records and personal healthcare information. HIPAA affects organizations that transmit protected health information in electronic form (e.g....

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Meeting Payment Card Industry Data Security Standards Using eEye Digital Security Solutions

    Virtually every few weeks one can read a report on yet another breach in Credit Card data. This is of an obvious concern to most people as it usually means the hassle of monitoring not only the credit card bill but also the entire credit history out of fear that...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Implementing a Successful Risk Assessment Strategy for Regulatory Compliance

    Tighter controls and increasing accountability for corporate integrity have driven legislation that imposes significant new regulations on publicly traded corporations. A common component in these regulations is the oversight of technology and the role it plays in the organization. The result: supporting IT infrastructures must prove to be secure and...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Protecting the Grid: CCS and eEye Team Up to Secure Power Plants

    Headquartered in Christiansburg, VA, Comprehensive Computer Solutions, Inc delivers computing systems to the energy sector. The challenge was securing industrial power plant computers. After evaluating several security options, CCS chose eEye Digital Security's Blink solution. Although Blink is designed as an Integrated Threat Management solution, with a suite of features...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Central Florida Educators Federal Credit Union Switch to Blink

    The Central Florida Educators Federal Credit Union (CFE) was having problems with its endpoint security. CFE has 16 branches in four central Florida counties. The challenge was finding an integrated security suite that protects robust endpoints, such as workstations, while protecting servers and virtualized computing environments. eEye's Blink Endpoint Security...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    The City of Miami Beach Turns to eEye for Zero-Day Protection, Policy Enforcement and Business Continuity

    City of Miami Beach IT provides centralized support to entire city, including code enforcement, fire and police departments. The trouble was that Miami Beach had a centralized IT department that supported a decentralized and heterogeneous user base. With the staff and budget of a small city, Martinez had to support...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Eide Bailly Technology Puts eEye to the Test

    Eide Bailly Technology is a division of Eide Bailly LLP, a top-25 CPA firm in the U.S. The challenge was finding a comprehensive vulnerability scanning solution to serve as the foundation for penetration testing services. It deployed customer sticks with eEye's Retina network security scanner. Retina was the most complete...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    SecureIIS Protects Iowa Department for the Blind From Worms and Other Threats

    The state-supported department serves approximately 7,000 blind or visually impaired Iowans, offering a variety of services, including library, vocational rehabilitation, independent living services and public education, as well as adjustment and orientation services for the newly blind. Several years ago the Iowa Department for the Blind had its main website...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Locknet Locks in Customer Loyalty With eEye

    Locknet was originally founded to provide IT security and compliance services to the financial sector. Locknet had a problem with travel. In order to provide security assessments, technicians had to get in the car and drive to each and every customer site. Obviously, this was a time-consuming process that did...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Mobile Knowledge Stretches Their Security Budget With eEye Blink

    Headquartered in Ottawa, Ontario, Canada, Mobile Knowledge is 150 customers worldwide and an installed base of over 50,000 mobile data terminals. When Mobile Knowledge went looking for a new security solution, they were in an enviable position. The challenge was improving zero-day protection bolstering internal security, streamlining security administration. It...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Sallie B. Howard School for the Arts Removes the Risk Behind Internet Browsing

    The Sallie B. Howard School for the Arts and Education (SBH), like many schools, is struggling to keep up with the times. To prepare students for life after school, the integration of technology is a must. However, relying on technology creates risks. Even with URL blocking in place, a supposedly...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Detecting Persistent Cross-Site Scripting

    In recent months, the author has seen a shift in the way that hackers ply their trade. Increasingly, instead of attacking applications to get to the databases they access, hackers are using applications to attack website users. Detection of Persistent Cross-Site Scripting attacks is very challenging because by their nature,...

    Provided By eEye Digital Security

  • Webcasts // Jan 2009

    Web-based Vulnerabilities and Attack Trends: A Government Focus

    This webcast is focused on the current threats and vulnerabilities affecting major installations within the Government Sector. The attendee will hear directly from the eEye Security Research Team. eEye's Research Team regularly consults with government agencies, other public sector agencies and congressional committees offering expert advice for vulnerability discovery, malware...

    Provided By eEye Digital Security

  • Webcasts // Jan 2009

    Fast Facts and Solutions on PCI Compliance

    The presenter of this webcast will provide facts on how to streamline operational effectiveness on PCI compliance and the solutions to meet regulatory compliance. The presenter will explore solutions that are able to map to all sections of PCI compliance.

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    SecureIIS Web Server Protection Guarding Microsoft Web Servers: When Bad Things Happen to Good Web App Servers

    Off late businesses require an added layer of protection to ensure that their Microsoft Internet Information Services (IIS) Web Server farms remain running without interruption even if a hacker mounts an attack, or the IIS Server is hit with an indiscriminate worm like CodeRed or Nimda. Further, this solution must...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Behind the Scenes Security: eEye in Focus

    The eEye / Norman partnership is a strong one. Norman was chosen as the only anti-virus to be utilized within Blink Endpoint Security, regarded as one of the strongest host-based protection suites on the market. Norman was selected for its unique ability to identify malware via generic sandbox methods while...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    eEye Digital Security Technical Brief: Remote and Mobile User Protection

    In today's interconnected and dynamic workplace, organizations rely on a large part of their workforce working remotely from corporate offices. This creates a situation where networks are driven by computing assets flowing in and out of network perimeters, with the need to provide remote assets access to the internal network....

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Best Practices for Securing Remote and Mobile Devices

    As the number of mobile and remote workers has exploded over the past few years, so too have the security risks they pose. With the rise in new and blended threats that use multiple vectors of attack, these workers are increasingly vulnerable. They also pose a growing threat to the...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    eEye Digital Security Technical Brief: Using Policy Enforcement to Enforce Security Standards

    In spite of advances made in the world of network security, a large percentage of security incidents are still being attributed to the "Internal threat" - end users, responsible for misconfiguring devices and programs, disclosing proprietary business information, or knowingly or unknowingly propagating malicious code. A recent study performed by...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Blink: Protection From the Threats of Today and Tomorrow

    A war is being waged against the desktop. Attacks against desktops within home and business networks occur every day, all in an attempt to gain unrestricted access to these systems. Attackers are smarter and more potent than they were in the past, many times being driven by stated intentions or...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Retina Network Security Scanner - The Need for Vulnerability Assessment & Remediation: What My CIO Needs to Know

    While it's no secret that identifying and correcting network security holes is critical to protecting any business from harmful attacks, the process of vulnerability assessment and remediation often gets overlooked as a critical component of sound security practices. Because it is an ongoing process, many companies avoid proper vulnerability auditing...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Retina Network Security Scanner: Intrusive Vs. Non-Intrusive Vulnerability Scanning Technology

    There are two methodologies used for performing vulnerability assessment regardless of patch assessment or compliance verification. One philosophy revolves around the need to penetrate a system to prove its vulnerability and the other uses available information to postulate the status of the vulnerability. Longstanding discussions have centered on the merits...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    What Every CIO Needs to Know About HIPAA Compliance

    Compliance with HIPAA is mandatory and violators face up to $250,000 in fines and jail time of up to 10 years. HIPAA regulations are intended to protect such data as a patient's medical records and personal healthcare information. HIPAA affects organizations that transmit protected health information in electronic form (e.g....

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Meeting Payment Card Industry Data Security Standards Using eEye Digital Security Solutions

    Virtually every few weeks one can read a report on yet another breach in Credit Card data. This is of an obvious concern to most people as it usually means the hassle of monitoring not only the credit card bill but also the entire credit history out of fear that...

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Implementing a Successful Risk Assessment Strategy for Regulatory Compliance

    Tighter controls and increasing accountability for corporate integrity have driven legislation that imposes significant new regulations on publicly traded corporations. A common component in these regulations is the oversight of technology and the role it plays in the organization. The result: supporting IT infrastructures must prove to be secure and...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Protecting the Grid: CCS and eEye Team Up to Secure Power Plants

    Headquartered in Christiansburg, VA, Comprehensive Computer Solutions, Inc delivers computing systems to the energy sector. The challenge was securing industrial power plant computers. After evaluating several security options, CCS chose eEye Digital Security's Blink solution. Although Blink is designed as an Integrated Threat Management solution, with a suite of features...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Central Florida Educators Federal Credit Union Switch to Blink

    The Central Florida Educators Federal Credit Union (CFE) was having problems with its endpoint security. CFE has 16 branches in four central Florida counties. The challenge was finding an integrated security suite that protects robust endpoints, such as workstations, while protecting servers and virtualized computing environments. eEye's Blink Endpoint Security...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    The City of Miami Beach Turns to eEye for Zero-Day Protection, Policy Enforcement and Business Continuity

    City of Miami Beach IT provides centralized support to entire city, including code enforcement, fire and police departments. The trouble was that Miami Beach had a centralized IT department that supported a decentralized and heterogeneous user base. With the staff and budget of a small city, Martinez had to support...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Eide Bailly Technology Puts eEye to the Test

    Eide Bailly Technology is a division of Eide Bailly LLP, a top-25 CPA firm in the U.S. The challenge was finding a comprehensive vulnerability scanning solution to serve as the foundation for penetration testing services. It deployed customer sticks with eEye's Retina network security scanner. Retina was the most complete...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    SecureIIS Protects Iowa Department for the Blind From Worms and Other Threats

    The state-supported department serves approximately 7,000 blind or visually impaired Iowans, offering a variety of services, including library, vocational rehabilitation, independent living services and public education, as well as adjustment and orientation services for the newly blind. Several years ago the Iowa Department for the Blind had its main website...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Locknet Locks in Customer Loyalty With eEye

    Locknet was originally founded to provide IT security and compliance services to the financial sector. Locknet had a problem with travel. In order to provide security assessments, technicians had to get in the car and drive to each and every customer site. Obviously, this was a time-consuming process that did...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Mobile Knowledge Stretches Their Security Budget With eEye Blink

    Headquartered in Ottawa, Ontario, Canada, Mobile Knowledge is 150 customers worldwide and an installed base of over 50,000 mobile data terminals. When Mobile Knowledge went looking for a new security solution, they were in an enviable position. The challenge was improving zero-day protection bolstering internal security, streamlining security administration. It...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Sallie B. Howard School for the Arts Removes the Risk Behind Internet Browsing

    The Sallie B. Howard School for the Arts and Education (SBH), like many schools, is struggling to keep up with the times. To prepare students for life after school, the integration of technology is a must. However, relying on technology creates risks. Even with URL blocking in place, a supposedly...

    Provided By eEye Digital Security

  • Case Studies // Sep 2009

    Brazil's Credit Union SICREDI Selects Eye's Retina Scanner to Tame Its Network Security Issues

    SICREDI, which has branches across central and southern Brazil, serves approximately 1.5 million customers. While SICREDI is considered as having a fairly mature security posture versus other banks in South America, the credit union knew that it could be at risk if it didn't continue to bolster its security profile....

    Provided By eEye Digital Security

  • Webcasts // Jan 2009

    Web-based Vulnerabilities and Attack Trends: A Government Focus

    This webcast is focused on the current threats and vulnerabilities affecting major installations within the Government Sector. The attendee will hear directly from the eEye Security Research Team. eEye's Research Team regularly consults with government agencies, other public sector agencies and congressional committees offering expert advice for vulnerability discovery, malware...

    Provided By eEye Digital Security

  • Webcasts // Jan 2009

    Fast Facts and Solutions on PCI Compliance

    The presenter of this webcast will provide facts on how to streamline operational effectiveness on PCI compliance and the solutions to meet regulatory compliance. The presenter will explore solutions that are able to map to all sections of PCI compliance.

    Provided By eEye Digital Security

  • White Papers // Sep 2009

    Detecting Persistent Cross-Site Scripting

    In recent months, the author has seen a shift in the way that hackers ply their trade. Increasingly, instead of attacking applications to get to the databases they access, hackers are using applications to attack website users. Detection of Persistent Cross-Site Scripting attacks is very challenging because by their nature,...

    Provided By eEye Digital Security