Lumension

Displaying 1-33 of 33 results

  • Webcasts // Jul 2010

    Three Ways to Reduce Power Consumption Costs,While Improving Your IT Security and Productivity

    Organizations stand to save themselves a significant amount of money by managing the power consumption of their IT systems. But if they aren't careful, they could potentially save their way right into a security and operational nightmare. When power management is not centralized nor built into your overall IT operational...

    Provided By Lumension

  • White Papers // May 2010

    Medical Records on the Run: Protecting Patient Data with Device Control and Encryption

    As the electronic medical records revolution takes hold of the healthcare industry, the benefits and drawbacks of digitized health documentation are being revealed.

    Provided By Lumension

  • White Papers // Mar 2010

    Six Critical Elements to Achieve Economies in Healthcare IT Security and Compliance

    Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Mar 2010

    Anatomy of Insider Risk: Why You Could Be Your Worst Enemy

    Organizations today are typically aware of the problems they face from inside the firewall, but so many leaders focus on the risk of thieves and disgruntled employees, that they leave too much room for error from the much more common insider threat: well-meaning, but negligent, insiders. Ill-trained and poorly monitored,...

    Provided By Lumension

  • White Papers // Feb 2010

    Four Steps to Cure Your Patch Management Headache

    The need to speed up patch deployment across today's highly complex and distributed IT environment has never been more important. The heat is on to proactively safeguard your systems and endpoints from the newest exploits as the time it takes hackers to exploit a known vulnerability continues to shrink. Using...

    Provided By Lumension

  • White Papers // Jan 2010

    The Great Balancing Act: Using USB Flash Drives in Government Environments

    USB flash drives and other portable devices are valuable tools in the typical government staffer's virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. But left unchecked, the use of portable devices can also potentially infect public systems...

    Provided By Lumension

  • White Papers // Jan 2010

    Three Ways to Seamlessly Prevent Insider Risk within your SCCM Environment

    With great advantages come great responsibilities. As the advances in USB devices have made them invaluable to most business users' workday processes, they have also exposed organizations to three enormous risks: data loss, data theft and malware propagation. Learn how removable device policy enforcement can prevent these risks while enabling...

    Provided By Lumension

  • White Papers // Jan 2010

    Three Ways to Prevent USB Insecurity in Your Enterprise

    As the advances in USB devices have made them invaluable to most business users' workday processes, they have also exposed their organizations to three enormous risks: data loss, data theft and malware propagation. Learn the keys to mitigating these risks while enabling managed use of these necessary productivity tools.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieve Economies in FISMA Compliance

    Through process automation, continuous compliance reporting, and security control enforcement, Lumension eases the FISMA compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies with NERC CIP Compliance

    Through process automation and security control enforcement, Lumension eases the NERC CIP compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in Healthcare IT Security and Compliance

    Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in FISMA Compliance

    Through process automation, continuous compliance reporting, and security control enforcement, Lumension eases the FISMA compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • Downloads // Dec 2009

    Lumension Security Application Scanner

    The Lumension Security Application Scanner is a network-based scanning utility that provides IT departments and executives the ability to discover what applications are running within a network. Unwanted and unauthorized applications can introduce malware, decrease performance, consume diskspace, waste network bandwidth and even slow user productivity. The Lumension Security Application...

    Provided By Lumension

  • Webcasts // Dec 2009

    Moving Beyond AV to Ensure Secure and Compliant Endpoints

    In today's Web 2.0 world, software is more distributed than ever before. Employees download a variety of Internet applications on a regular basis, with each new download altering system configurations and increasing your exposure to malicious software. Financially motivated cybercriminals are designing malware attacks to specifically bypass traditional security methods...

    Provided By Lumension

  • Webcasts // Dec 2009

    Harmonizing Controls to Reduce Your Cost of Compliance

    Mounting regulations across the globe have increased the cost and burden on organizations. The high cost is especially felt by organizations which must adhere to multiple requirements - 75 percent of organizations must comply with two or more regulations and corresponding audits and more than 40 percent must comply with...

    Provided By Lumension

  • Webcasts // Dec 2009

    Device/Port Control and Data Encryption within Microsoft System Center

    Today's global enterprise is more mobile than ever. Data can be transferred via removable storage devices quite easily, enhancing productivity but also introducing risk such as data loss and theft, as well as malware introduction via removable devices / media. While organizations have been able to maximize the value of...

    Provided By Lumension

  • Webcasts // Dec 2009

    Keys to Aligning Security and Compliance - How to Connect the Dots

    The pressure is on as organizations today face mounting demands to maintain an enterprise-wide security posture while adhering to the growing number of compliance regulations. Without the right processes and tools to effectively navigate through the security and compliance maze, IT professionals often resort to manually poring through spreadsheets and...

    Provided By Lumension

  • White Papers // Oct 2009

    Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions

    Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.

    Provided By Lumension

  • White Papers // Sep 2009

    Reducing the Cost of Achieving PCI Compliance with Lumension Compliance and IT Risk Management

    Reducing the Cost of Achieving PCI Compliance with Lumension? Compliance and IT Risk Management Organizations across the globe are required to demonstrate PCI compliance to ensure that cardholder data is protected and secure from numerous internal and external threats. The challenge for most organizations is that demonstrating compliance is usually...

    Provided By Lumension

  • White Papers // Aug 2009

    5 Ways to Reduce IT Audit Tax

    Taxes are certainly not fun, but there is something worse: an audit. Combine the two in a risk and compliance scenario and you have the onerous "audit tax," a figurative term used to describe the expenses a company incurs when deploying resources and manpower to satisfy the burgeoning set of...

    Provided By Lumension

  • White Papers // Jul 2009

    Achieving compliance with GSi Code Of Connection (CoCo)

    In November 2005, The Government published 'Transformational Government - Enabled by Technology' which documents the steps necessary to achieve effective delivery of technology for Government. To develop the necessary trust and confidence within the Public Sector communities and between Government and the citizens, a common approach to risk management...

    Provided By Lumension

  • White Papers // Jul 2009

    Achieving Compliance with Massachusetts Data Protection Law

    As of March 1, 2010, all organizations with operations and/or customers in the state of Massachusetts will be required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information. These requirements include enforcing password security, encrypting all personal information stored on laptops and removable devices...

    Provided By Lumension

  • Webcasts // Jun 2009

    Live Event: Profile of the World's Top Hackers

    Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing damage. And this current economic climate has undoubtedly created more opportunities for hackers, criminals, and industrial espionage firms who are targeting critical infrastructures and systems to...

    Provided By Lumension

  • White Papers // Jun 2009

    Portable Panic: The Evolution of USB Insecurity

    As USB devices have evolved into useful storage media, they've also turned into a security nightmare for organizations. The usage of USB devices should be encouraged and embraced today in our tightening economy to aid in the reduction of operating costs. Learn how to take control of the removable media...

    Provided By Lumension

  • White Papers // Jun 2009

    Why Free Patch Management Could Cost You More

    Today's current economic situation underscores the importance of scrutinizing all business expenses, particularly within IT. Although point patching products may look more attractive on the surface, closer inspection often reveals hidden costs and missing capabilities. The result: fragmented patch management and weaker security posture while also being a more costly...

    Provided By Lumension

  • White Papers // Jun 2009

    Laying the IT Security Foundation: Key Steps to Preventing Cyber Attacks

    The traditional security approach addresses each individual attack as it crops up through a detect and blocking schema. However in today's ever-changing IT environment, sophisticated threats such as Conficker worm continue to evolve and keep security professionals in an unending game of cat and mouse. Read this paper to learn...

    Provided By Lumension

  • White Papers // Jun 2009

    Achieving NERC Cyber Security Standards Compliance with Lumension® Solutions

    The North American Electric Reliability Corporation (NERC) is a non-profit corporation chartered to ensure that the bulk electric system in North America is reliable, adequate and secure. NERC CIP standards and guidelines apply to all Responsible Entities (REs) within the bulk-power system, including investor-owned utilities, most generation and transmission (G&T)...

    Provided By Lumension

  • White Papers // Jun 2009

    Achieving Compliance with PCI DSS v1.2 with Lumension® Solutions

    PCI DSS applies to those organizations that store, transmit or process cardholder information payments; encompassing service providers, merchant acquirers, third party processors and even data storage entities. Processors represent organizations of significant transaction volume making them tantalizing targets for attack. The breaches in late 2008 and early 2009 of RBS...

    Provided By Lumension

  • White Papers // Jun 2009

    Achieving Federal Desktop Core Configuration Compliance (FDCC) with Lumension® Solutions

    The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. All federal agencies that utilize or...

    Provided By Lumension

  • White Papers // May 2009

    Achieving Federal Desktop Core Configuration Compliance With Lumension Solutions

    The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. These FDCC guidelines were developed at...

    Provided By Lumension

  • White Papers // Mar 2009

    Compliance with Data Handling Procedures in UK Government

    The UK Data Handling Procedures in Government Report set out clear and mandatory procedures to be followed by all government employees that have access to and responsibility for citizen data. The Report was drafted at the request of Prime Minister, Gordon Brown, in response to HMRC's loss of 2 compact...

    Provided By Lumension

  • Downloads // Dec 2008

    Assess Your Network for Vulnerabilities with Lumension Vulnerability Scanner

    In today's Web 2.0 IT environment, the risks to your business systems and vital information continue to rise. Vulnerabilities across operating systems, applications and system configurations are exploited at a faster rate than ever before. And more than 90 percent of attacks exploit vulnerabilities for which a patch existed. Take...

    Provided By Lumension

  • Downloads // Jul 2008

    Quantify Your Insider Risk with Lumension Device Scanner

    In today's borderless enterprise, your data is more at risk from insiders than ever before. With removable devices like USB sticks continuing to increase in storage capacity, it has never been easier to access and transport large amounts of data and as such protecting your sensitive information has never been...

    Provided By Lumension

  • Downloads // Dec 2008

    Assess Your Network for Vulnerabilities with Lumension Vulnerability Scanner

    In today's Web 2.0 IT environment, the risks to your business systems and vital information continue to rise. Vulnerabilities across operating systems, applications and system configurations are exploited at a faster rate than ever before. And more than 90 percent of attacks exploit vulnerabilities for which a patch existed. Take...

    Provided By Lumension

  • White Papers // Jul 2009

    Achieving compliance with GSi Code Of Connection (CoCo)

    In November 2005, The Government published 'Transformational Government - Enabled by Technology' which documents the steps necessary to achieve effective delivery of technology for Government. To develop the necessary trust and confidence within the Public Sector communities and between Government and the citizens, a common approach to risk management...

    Provided By Lumension

  • White Papers // May 2009

    Achieving Federal Desktop Core Configuration Compliance With Lumension Solutions

    The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. These FDCC guidelines were developed at...

    Provided By Lumension

  • White Papers // Oct 2009

    Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions

    Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.

    Provided By Lumension

  • Downloads // Dec 2009

    Lumension Security Application Scanner

    The Lumension Security Application Scanner is a network-based scanning utility that provides IT departments and executives the ability to discover what applications are running within a network. Unwanted and unauthorized applications can introduce malware, decrease performance, consume diskspace, waste network bandwidth and even slow user productivity. The Lumension Security Application...

    Provided By Lumension

  • Webcasts // Dec 2009

    Moving Beyond AV to Ensure Secure and Compliant Endpoints

    In today's Web 2.0 world, software is more distributed than ever before. Employees download a variety of Internet applications on a regular basis, with each new download altering system configurations and increasing your exposure to malicious software. Financially motivated cybercriminals are designing malware attacks to specifically bypass traditional security methods...

    Provided By Lumension

  • Webcasts // Dec 2009

    Harmonizing Controls to Reduce Your Cost of Compliance

    Mounting regulations across the globe have increased the cost and burden on organizations. The high cost is especially felt by organizations which must adhere to multiple requirements - 75 percent of organizations must comply with two or more regulations and corresponding audits and more than 40 percent must comply with...

    Provided By Lumension

  • Webcasts // Dec 2009

    Device/Port Control and Data Encryption within Microsoft System Center

    Today's global enterprise is more mobile than ever. Data can be transferred via removable storage devices quite easily, enhancing productivity but also introducing risk such as data loss and theft, as well as malware introduction via removable devices / media. While organizations have been able to maximize the value of...

    Provided By Lumension

  • Webcasts // Dec 2009

    Keys to Aligning Security and Compliance - How to Connect the Dots

    The pressure is on as organizations today face mounting demands to maintain an enterprise-wide security posture while adhering to the growing number of compliance regulations. Without the right processes and tools to effectively navigate through the security and compliance maze, IT professionals often resort to manually poring through spreadsheets and...

    Provided By Lumension

  • White Papers // Jan 2010

    The Great Balancing Act: Using USB Flash Drives in Government Environments

    USB flash drives and other portable devices are valuable tools in the typical government staffer's virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. But left unchecked, the use of portable devices can also potentially infect public systems...

    Provided By Lumension

  • White Papers // Jan 2010

    Three Ways to Seamlessly Prevent Insider Risk within your SCCM Environment

    With great advantages come great responsibilities. As the advances in USB devices have made them invaluable to most business users' workday processes, they have also exposed organizations to three enormous risks: data loss, data theft and malware propagation. Learn how removable device policy enforcement can prevent these risks while enabling...

    Provided By Lumension

  • White Papers // Jan 2010

    Three Ways to Prevent USB Insecurity in Your Enterprise

    As the advances in USB devices have made them invaluable to most business users' workday processes, they have also exposed their organizations to three enormous risks: data loss, data theft and malware propagation. Learn the keys to mitigating these risks while enabling managed use of these necessary productivity tools.

    Provided By Lumension

  • White Papers // Feb 2010

    Four Steps to Cure Your Patch Management Headache

    The need to speed up patch deployment across today's highly complex and distributed IT environment has never been more important. The heat is on to proactively safeguard your systems and endpoints from the newest exploits as the time it takes hackers to exploit a known vulnerability continues to shrink. Using...

    Provided By Lumension

  • White Papers // Mar 2010

    Six Critical Elements to Achieve Economies in Healthcare IT Security and Compliance

    Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieve Economies in FISMA Compliance

    Through process automation, continuous compliance reporting, and security control enforcement, Lumension eases the FISMA compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Mar 2010

    Anatomy of Insider Risk: Why You Could Be Your Worst Enemy

    Organizations today are typically aware of the problems they face from inside the firewall, but so many leaders focus on the risk of thieves and disgruntled employees, that they leave too much room for error from the much more common insider threat: well-meaning, but negligent, insiders. Ill-trained and poorly monitored,...

    Provided By Lumension

  • White Papers // May 2010

    Medical Records on the Run: Protecting Patient Data with Device Control and Encryption

    As the electronic medical records revolution takes hold of the healthcare industry, the benefits and drawbacks of digitized health documentation are being revealed.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies with NERC CIP Compliance

    Through process automation and security control enforcement, Lumension eases the NERC CIP compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in Healthcare IT Security and Compliance

    Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • White Papers // Jan 2010

    Six Critical Elements to Achieving Economies in FISMA Compliance

    Through process automation, continuous compliance reporting, and security control enforcement, Lumension eases the FISMA compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.

    Provided By Lumension

  • Webcasts // Jul 2010

    Three Ways to Reduce Power Consumption Costs,While Improving Your IT Security and Productivity

    Organizations stand to save themselves a significant amount of money by managing the power consumption of their IT systems. But if they aren't careful, they could potentially save their way right into a security and operational nightmare. When power management is not centralized nor built into your overall IT operational...

    Provided By Lumension

  • Webcasts // Jun 2009

    Live Event: Profile of the World's Top Hackers

    Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing damage. And this current economic climate has undoubtedly created more opportunities for hackers, criminals, and industrial espionage firms who are targeting critical infrastructures and systems to...

    Provided By Lumension

  • White Papers // Mar 2009

    Compliance with Data Handling Procedures in UK Government

    The UK Data Handling Procedures in Government Report set out clear and mandatory procedures to be followed by all government employees that have access to and responsibility for citizen data. The Report was drafted at the request of Prime Minister, Gordon Brown, in response to HMRC's loss of 2 compact...

    Provided By Lumension

  • Downloads // Jul 2008

    Quantify Your Insider Risk with Lumension Device Scanner

    In today's borderless enterprise, your data is more at risk from insiders than ever before. With removable devices like USB sticks continuing to increase in storage capacity, it has never been easier to access and transport large amounts of data and as such protecting your sensitive information has never been...

    Provided By Lumension

  • White Papers // Jun 2009

    Portable Panic: The Evolution of USB Insecurity

    As USB devices have evolved into useful storage media, they've also turned into a security nightmare for organizations. The usage of USB devices should be encouraged and embraced today in our tightening economy to aid in the reduction of operating costs. Learn how to take control of the removable media...

    Provided By Lumension

  • White Papers // Jun 2009

    Why Free Patch Management Could Cost You More

    Today's current economic situation underscores the importance of scrutinizing all business expenses, particularly within IT. Although point patching products may look more attractive on the surface, closer inspection often reveals hidden costs and missing capabilities. The result: fragmented patch management and weaker security posture while also being a more costly...

    Provided By Lumension

  • White Papers // Jun 2009

    Laying the IT Security Foundation: Key Steps to Preventing Cyber Attacks

    The traditional security approach addresses each individual attack as it crops up through a detect and blocking schema. However in today's ever-changing IT environment, sophisticated threats such as Conficker worm continue to evolve and keep security professionals in an unending game of cat and mouse. Read this paper to learn...

    Provided By Lumension

  • White Papers // Jun 2009

    Achieving NERC Cyber Security Standards Compliance with Lumension® Solutions

    The North American Electric Reliability Corporation (NERC) is a non-profit corporation chartered to ensure that the bulk electric system in North America is reliable, adequate and secure. NERC CIP standards and guidelines apply to all Responsible Entities (REs) within the bulk-power system, including investor-owned utilities, most generation and transmission (G&T)...

    Provided By Lumension

  • White Papers // Jun 2009

    Achieving Compliance with PCI DSS v1.2 with Lumension® Solutions

    PCI DSS applies to those organizations that store, transmit or process cardholder information payments; encompassing service providers, merchant acquirers, third party processors and even data storage entities. Processors represent organizations of significant transaction volume making them tantalizing targets for attack. The breaches in late 2008 and early 2009 of RBS...

    Provided By Lumension

  • White Papers // Jun 2009

    Achieving Federal Desktop Core Configuration Compliance (FDCC) with Lumension® Solutions

    The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. All federal agencies that utilize or...

    Provided By Lumension

  • White Papers // Jul 2009

    Achieving Compliance with Massachusetts Data Protection Law

    As of March 1, 2010, all organizations with operations and/or customers in the state of Massachusetts will be required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information. These requirements include enforcing password security, encrypting all personal information stored on laptops and removable devices...

    Provided By Lumension

  • White Papers // Aug 2009

    5 Ways to Reduce IT Audit Tax

    Taxes are certainly not fun, but there is something worse: an audit. Combine the two in a risk and compliance scenario and you have the onerous "audit tax," a figurative term used to describe the expenses a company incurs when deploying resources and manpower to satisfy the burgeoning set of...

    Provided By Lumension

  • White Papers // Sep 2009

    Reducing the Cost of Achieving PCI Compliance with Lumension Compliance and IT Risk Management

    Reducing the Cost of Achieving PCI Compliance with Lumension? Compliance and IT Risk Management Organizations across the globe are required to demonstrate PCI compliance to ensure that cardholder data is protected and secure from numerous internal and external threats. The challenge for most organizations is that demonstrating compliance is usually...

    Provided By Lumension