Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Jun 2014

    Fundamentals of the PKI Infrastructure

    Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data...

    Sponsored By Global Knowledge

  • White Papers // Feb 2014

    Anatomy of a Cyber-Attack

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Securing and controlling data in the cloud

    The Securing and Controlling Data in the Cloud white paper evaluates the benefits of cloud computing, the security challenges posed by the cloud and provides recommendations to secure and control sensitive data in cloud environments.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing Big Data

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Tips on Preparing for and Passing the VCP5-DCV Exam

    This paper is aimed at IT professionals who are interested in earning a VMware Certified Professional on Data Center Virtualization (VCP5-DCV) certification. It provides the benefits of having the certification, details for earning the certification, and tips for passing the exam.

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Security eBook : Identity as the New Perimeter

    This eBook provides some insights on why traditional security approaches fall short in the face of new and emerging workplace trends. Download this report and learn how CA Technologies helped organisations improved security perimeter.

    Sponsored By CA Technologies

  • White Papers // Aug 2014

    Aberdeen Group :Infographic ERP Simplify Life at Work

    This Aberdeen's research provides the latest findings on the challenges for businesses without a single system. Read this infographic and learn how a single system provides accurate, easy to find data that enables visibility, collaboration and increase efficiency.

    Sponsored By SAP

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Mobile devices are conduits of greater access and information, but can serve as a vehicle for malware and other security threats. Find out how your IT department can enable secure access for mobile devices and laptops to ensure network integrity and security.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks. Download the white paper today to learn more.

    Sponsored By Dell Software

  • White Papers // Nov 2013

    Best Practices Guide for IT Governance & Compliance

    Federal regulations require businesses to know exactly what changes are made to structured and unstructured data within their corporate networks. Learn how the best practices for implementing a compliance solution in this white paper can help you minimize stress during your next IT compliance audit.

    Sponsored By Dell Software

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    What to Look For When Evaluating NGFW

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

    Sponsored By Dell Software

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Sponsored By IBM

  • White Papers // May 2014

    Company Success Through Business Intelligence

    Forrester conducted in-depth surveys and found strong correlations between overall company success and adoption of innovative BI, analytics, and big data tools. In this paper, you will learn what separates the leading companies from the rest when it comes to exploiting innovative technologies in BI and analytics, and what steps...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data Gets Personal: Business Report

    Big data and personal data are converging to shape the Internet's most surprising consumer products. They'll predict your needs and store your memories -- if you let them. Fast-developing methods for collecting and analyzing these types of "big data" promise valuable insights to retailers, urban planners, and for individuals. This...

    Sponsored By SAP

  • White Papers // Jul 2014

    Securing Big Data HADOOP Performance with Vormetric Transparent Encryption

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Apr 2014

    Managing hybrid clouds: A comprehensive, secure, and flexible cloud management solution white paper

    Hybrid cloud delivery brings a fundamental shift to the enterprise, and a new style of IT. The IT department that develops a hybrid delivery model, one that creates an optimal mix of traditional IT, private, and public cloud, is the department that realizes success. Read the white paper and learn...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    Application, Usage and Threat Report 2014

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    PCI Compliance and Mobile Devices

    The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014. Merchants and Service Providers that store, process, or transmit customer payment card data must adhere to the revised outlined requirements. Additionally, the...

    Sponsored By MobileIron

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Jun 2014

    The Future of Work: Exceed Customer Expectations with Workload Management

    Customers expect a great end-to-end experience, whether work is accomplished in the enterprise or in the back office, it's all part of the Customer Service Value Chain. Is your enterprise meeting this expectation? What about in the future? In this white paper, Genesys outlines its vision for The Future of...

    Sponsored By Genesys Telecommunications Laboratories

  • White Papers // Aug 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

    Sponsored By IBM

  • White Papers // Aug 2014

    Reducing the Cost and Complexity of Endpoint Management - Report

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for Security Intelligence & Event Management

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    Enhancing Cloud Connectivity For Optimal Application Performance

    Increasing dependence on Cloud-based applications hosted in distant data centres makes the quality of backbone networks connecting them increasingly critical. Network quality between Cloud providers and end-users in fact widely varies, and chronically threatens application performance. Differences in carrier network design become more significant as dependence on the Cloud intensifies....

    Sponsored By Level 3 Communications