Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Oct 2013

    EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar

    This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach.

    Download this analyst report to discover how...

    Sponsored By IBM

  • White Papers // Oct 2013

    Significant Hidden Threats to Your Enterprise Security

    This white paper focuses on SSH user key remediation as a process which all organizations utilizing SSH should be aware of and consider implementing. It will outline a basic process and set of tools which can be utilized to identify the existing trust relationships in your environment, bring legacy keys...

    Sponsored By ssh

  • White Papers // Oct 2013

    The Big Data Security Analytics Era Is Here

    Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means...

    Sponsored By EMC

  • White Papers // Oct 2013

    Is Big Data Worth Its Weight in Security Gold?

    Big data techniques are seen as increasingly valuable by organisations seeking to maximise their security intelligence. This informative and interesting infographic discusses how big data has enhanced security analytics and when used together can be used to protect your company.

    Sponsored By EMC

  • White Papers // Oct 2013

    EMC 15-minute guide to continuous availability

    Everyone in business today expects to be able to access applications and data whenever and wherever they need to. Users and customers have less tolerance for downtimes, planned or unplanned.

    Continuous availability can tackle these challenges and this paper explores this in more depth and how it can be...

    Sponsored By EMC

  • Videos // Oct 2013

    RSA Security Analytics Demo

    See how RSA Security Analytics helps security analysts detect and investigate threats often missed by other security tools to cut attacker free time from weeks to hours. This video will guide you through the investigation of a mock security attack.

    Sponsored By EMC

  • White Papers // Oct 2013

    Implementing a Security Analytics Architecture

    According to the 2012 Verizon Data Breach Investigations report, 99 percent of breaches led to data compromise within "days" or less, whereas 85 percent of breaches took "weeks" or more to discover. New security threats demand a new approach to security management.

    Read how the RSA approach to security...

    Sponsored By EMC

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000.

    Register now to learn:

  • Is the PC dead? What’s really...

    Sponsored By Dell Kace

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as:

      ...

      Sponsored By Kaspersky Lab

    • Podcasts // Oct 2013

      Managers Know More with Oracle Sales Cloud

      Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.

      Sponsored By Oracle

    • Downloads // Sep 2013

      Your Active Directory Problems are Much Bigger than You Think

      When diagnosing the cause of your Active Directory problems, native auditing won’t show you the complete picture of exactly what changed before your problems started. Netwrix Auditor Does what Native Auditing Can’t:

      • Instantly alerts you on critical changes
      • Every detail, exposed – who changed what and when...

        Sponsored By netwrix

      • Webcasts // Sep 2013

        An Overview of VMware vCloud® Networking and Security (vCNS)

        VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

        Sponsored By VMware

      • White Papers // Sep 2013

        CSO - Cloud Security and Myths and Strategies Uncovered

        This executive level paper highlights trends and findings from CIO’s 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter. Featured content includes debunked myths of securing cloud environments, how the secure cloud is a key business enabler for the CSO, as well...

        Sponsored By VMware

      • White Papers // Sep 2013

        IT Process Institute - Cloud Strategy Brief: IT Value Transformation Roadmap

        IT organizations are perceived by the business in two ways - as a cost center or a center of strategic value. This paper provides a virtualization and private cloud centric road map for IT value transformation, highlighting the objectives, challenges, required competencies, success factors and success measures at each stage.

        Sponsored By VMware

      • White Papers // Sep 2013

        What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

        Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

        Sponsored By Symantec

      • White Papers // Sep 2013

        Not Just for PCs Anymore: The Rise of Mobile Malware

        Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

        Sponsored By Sophos

      • White Papers // Sep 2013

        Data Loss Prevention: Providing Proactive Compliance Management

        Managing compliance and internal security polices can feel like a constant battle. IT organizations not only struggle with day-to-day operational efficiencies but also how to implement the internal controls over critical IT systems and people. In this new white paper, learn common industry regulations in America and abroad. Then, see...

        Sponsored By Dell Software

      • White Papers // Sep 2013

        The cyber threat facing the Financial Sector and all of us

        Cybercrime is the second most commonly reported economic crime in the Financial Services sector, accounting for 38% of incidents. Unfortunately this is a trend that is predicted to continue on an upward trajectory.

        Your financial institution is only one vulnerability away from being compromised. If you were ever in any...

        Sponsored By Secunia

      • White Papers // Sep 2013

        How to Secure a Moving Target with Limited Resources

        It is estimated that 34.3% of the Earth's population has access to the Internet. The fact that the majority of organizations have highly confidential data in the cloud, not to mention that all manner of financial and personal information is being shared online; means that there is an almost endless...

        Sponsored By Secunia

      • White Papers // Sep 2013

        Tucson Electric Power Commissions Secunia's Vulnerability Intelligence Manager for NERC Compliance

        As part of their commitment to deliver safe, reliable energy services, Tucson Electric Power recognized the need to upgrade their security systems and fulfill North American Electric Reliability Corporation (NERC) compliance standards, including Critical Infrastructure Protection (CIP) requirements.

        To manage everyday operations, IT Security relied on many information sources...

        Sponsored By Secunia

      • White Papers // Sep 2013

        The Importance of DMARC

        Keeping your customers safe goes hand in hand with keeping them happy. For instance, customers are 42% less likely to do business with a company that has undergone a phishing attack. Learn how you can implement DMARC for your email program and keep you and your customers safe.

        Sponsored By Dyn

      • White Papers // Sep 2013

        Building Your Sender Reputation In Four Steps

        Having trouble reaching your customers’ inboxes? You might have a poor sender reputation. Similar to a credit score, sender reputations reflect how good or bad your sending habits are If your reputation is lower than you’d like just follow these 4 easy steps to start hitting the inbox.

        Sponsored By Dyn

      • White Papers // Sep 2013

        Three questions every CISO should ask himself about vulnerabilities

        Are you leaving your company exposed? Do you know how your team prioritizes vulnerabilities today and whether they are in fact dealing with the critical ones first? Ensuring that software vulnerabilities, and in particular the critical ones, are being handled should be at the top of the CISO agenda -...

        Sponsored By Secunia

      • White Papers // Sep 2013

        Intro: Secunia Vulnerability Intelligence Manager (VIM) 4.0

        The Secunia VIM 4.0 is a powerful Vulnerability Intelligence and Management tool that provides you with the necessary information to analyze vulnerabilities in your IT infrastructure, enabling you to track and eliminate them easily from a centralized dashboard interface. Read on to find out how Secunia can help your business...

        Sponsored By Secunia

      • Podcasts // Sep 2013

        Step Up to the IT Security Challenge

        Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

        A deeper understanding of how to manage your IT...

        Sponsored By Kaspersky Lab

      • White Papers // Sep 2013

        Phishing: No. 1 web threat and how web security can protect your company

        This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products.

        Learn...

        Sponsored By Webroot Software

      • eBooks // Sep 2013

        5 Services to Help Grow Your Business in 2013

        What’s your growth and client retention strategy? Technology providers need to be on the breaking edge of technology trends and consumer demands. The last thing you want is to lose a client because you don’t offer a certain service. So what services are clients asking for in 2013? Download this...

        Sponsored By ConnectWise

      • White Papers // Sep 2013

        Whitepaper: DDoS Defense for Financial Services Companies

        Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but...

        Sponsored By Arbor Networks

      • White Papers // Sep 2013

        Whitepaper: How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

        In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more...

        Sponsored By Arbor Networks

      • White Papers // Sep 2013

        Whitepaper: The Business Value of DDoS Protection

        Today's hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations - provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a...

        Sponsored By Arbor Networks

      • White Papers // Sep 2013

        Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach

        Information security best practices are all about mitigating risks. There is no 100 percent fail-safe security program, device or system. It takes an orchestrated effort between managed security services, threat intelligence and incident response to provide the strongest defense. This paper presents the advantages of a single-outsourced solution for managed...

        Sponsored By Dell

      • White Papers // Sep 2013

        How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

        Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need...

        Sponsored By Arbor Networks

      • White Papers // Sep 2013

        DDoS Defense for Financial Services Companies

        Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but...

        Sponsored By Arbor Networks

      • White Papers // Sep 2013

        The Business Value of DDoS Protection

        Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack...

        Sponsored By Arbor Networks

      • White Papers // Sep 2013

        10 Tips to Minimize the Impact of a Security Breach

        The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help minimize the duration and impact of a security breach. This white paper also includes 18 additional recommendations regarding technical issues, configuration and processes.

        Sponsored By Dell

      • White Papers // Sep 2013

        Security Testing and Assessment Services Guide

        This document provides you with an understanding of common cyber security tests and assessments organizations can use to evaluate their security posture and the distinctions between them. It will help you more accurately determine which assessment may be appropriate for your organization’s needs.

        Sponsored By Dell

      • White Papers // Sep 2013

        Why the Growth is moving from In-House to Managed Services

        Small and medium businesses are moving away from managing their network security in-house in favor of outsourcing it to managed security services providers. In fact, Aberdeen's 1Q2013 study of nearly 200 organizations found that more than half of all respondents have outsourced at least one of their IT Security solutions,...

        Sponsored By Dell

      • White Papers // Sep 2013

        Discussing Windows XP Migration with Management WP

        In the wake of major security, management, and interface limitations, Microsoft has decided to end support for Windows XP. This decision has important implications for corporate management as it presents a number of risk, security, operations, and compliance issues. This white paper looks at the top five issues that business...

        Sponsored By Lenovo

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements.

    Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    “Super users” – those people with greater access and rights – are a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Especially with today’s security and compliance concerns, effectively managing privileged accounts is...

    Sponsored By Dell Software

  • White Papers // Jul 2013

    2012 IBM X-Force Annual Trend and Risk Report

    The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Oct 2012

    Phishing: How to protect your business

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Sponsored By Symantec

  • White Papers // Nov 2012

    The Simplification of Corporate IT

    The traditional on-premise enterprise resource planning / management (ERP/M) model needs a radical rethink. This Workday paper explains how large organisations are moving to the cloud and benefitting from a SaaS model that offers enterprise-class security, predictable operating expenditures, rapid scaling and analysis tools that use a familiar web interface.

    Sponsored By Workday

  • Webcasts // Feb 2013

    Mitigating Insider Threats

    IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automates, and tracks use of privileged account access. The solution helps protect clients at their most vulnerable points, from the people who have legitimate access and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Identity and Access Intelligence: Transforming Enterprise Security

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Mar 2013

    Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Center: EMC Best Practices in Data Protection Monitoring

    Regardless of whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. It should not come as a surprise that, according to ESG's 2013 IT Spending Intentions Survey, improving data backup and recovery was the...

    Sponsored By EMC

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Sponsored By McAfee

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Sponsored By McAfee

  • White Papers // Mar 2013

    Legal Issues of Cloud Forensics

    Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. If they need to collect information from the cloud to determine what happened, to determine what was lost or compromised, for remediation, for civil litigation, or for...

    Sponsored By Global Knowledge

  • White Papers // May 2011

    10 Essential Security Policies

    Every organization needs a corporate security policy to firmly establish guidelines that will keep the company's resources and knowledge safe. This white paper discusses ten such guidelines that should be included in every security policy. While certainly not a conclusive study of essential practices, these ten suggestions are a good...

    Sponsored By Global Knowledge

  • White Papers // Oct 2010

    SharePoint 2010 Document Sets: Better Ways To Manage Content

    Content management is the process of managing information from a technology perspective. It encompasses all facets of data management to include the process of collecting and distributing information, regardless of the medium used. This white paper explains how document sets, which can make your life easier from the point of...

    Sponsored By Global Knowledge

  • White Papers // Sep 2012

    Ten Steps to Better, Stronger Passwords

    Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are no longer considered a secure form of authentication. You should consider any static password that you can remember as...

    Sponsored By Global Knowledge

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Sponsored By Symantec

  • White Papers // Apr 2013

    Three Ways to Improve Your Data Storage Capabilities

    Every company is interested in capturing, analyzing and taking action on data. Unfortunately, many data solutions and partners promise the world but offer very little. Whether you're thinking of switching to the cloud, or trying to reduce costs, or you're just searching for a scalable solution, understanding the best ways...

    Sponsored By EMC

  • White Papers // Sep 2013

    Security Testing and Assessment Services Guide

    This document provides you with an understanding of common cyber security tests and assessments organizations can use to evaluate their security posture and the distinctions between them. It will help you more accurately determine which assessment may be appropriate for your organization’s needs.

    Sponsored By Dell

  • White Papers // Feb 2013

    Intelligent role management for improved security and compliance

    In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • Webcasts // Jun 2013

    BlackBerry 10 Security: Nuts and Bolts

    Curious about how BlackBerry? Balance is built into the core of the QNX-based BlackBerry? 10 operating system? Want to understand exactly what makes BlackBerry? the gold standard for security end-to-end mobility? Wondering about the advanced security controls for high-security and regulated industries, managed through BlackBerry? Enterprise Service 10? If you...

    Sponsored By BlackBerry

  • White Papers // Sep 2013

    The Business Value of DDoS Protection

    Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack...

    Sponsored By Arbor Networks

  • White Papers // Oct 2013

    Is Big Data Worth Its Weight in Security Gold?

    Big data techniques are seen as increasingly valuable by organisations seeking to maximise their security intelligence. This informative and interesting infographic discusses how big data has enhanced security analytics and when used together can be used to protect your company.

    Sponsored By EMC

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere BigInsights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time correlation...

    Sponsored By IBM

  • eBooks // Sep 2013

    5 Services to Help Grow Your Business in 2013

    What’s your growth and client retention strategy? Technology providers need to be on the breaking edge of technology trends and consumer demands. The last thing you want is to lose a client because you don’t offer a certain service. So what services are clients asking for in 2013? Download this...

    Sponsored By ConnectWise

  • White Papers // Sep 2013

    Discussing Windows XP Migration with Management WP

    In the wake of major security, management, and interface limitations, Microsoft has decided to end support for Windows XP. This decision has important implications for corporate management as it presents a number of risk, security, operations, and compliance issues. This white paper looks at the top five issues that business...

    Sponsored By Lenovo

  • White Papers // Oct 2012

    IP Version 6 Address Types

    In 1998, the Internet Engineering Task Force (IETF) released RFC 2460, outlining the technical specifications of IPv6, which addressed the shortcomings of the aging IPv4 protocol. As with any evolution of technology, new elements exist in the protocol that may seem strange and unfamiliar. This certainly includes address representation, space,...

    Sponsored By Global Knowledge

  • White Papers // Dec 2012

    Windows Server 2012 and the Resilient File System (ReFS)

    Over the past 20 years, NTFS has become the de facto standard for a Microsoft enterprise file system. With the introduction of Windows Server 2012, Microsoft has released its latest file system, Resilient File Systems (ReFS), as a capable replacement to NTFS. Learn more about how ReFS brings new features...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Top Ten Cybersecurity Risks: How Prepared Are you for 2013?

    Rather than looking back over the past year, organizations and individuals need to start assessing cyber security threats that lie ahead in the New Year. While there is always the chance for a new threat or risk to be unearthed this year, often the risks of the New Year are...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Demystifying Switch-based ACLs

    Access Control Lists (ACLs) are a common staple of Cisco networking, traffic control, and security topics. Access-list configuration and deployment on routers is familiar to most network professionals, but the unique nuances of these same constructs on switches may be much less familiar. This white paper explores switch-based access-lists, explains...

    Sponsored By Global Knowledge

  • White Papers // Mar 2013

    Password Change Service - Avaya CallPilot

    Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator how to set up and utilize Password Reset Service, introduced with CallPilot Release 5. This feature is not unlike...

    Sponsored By Global Knowledge

  • White Papers // Aug 2013

    Multi-Step Authentication and Why You Should Use It

    Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). Authentication is the process of claiming an identity the proving that you are that claimed identity. Authorization is the mechanism to control what you can access or...

    Sponsored By Global Knowledge

  • White Papers // Jul 2013

    How To Secure Online Activities

    The Internet is not automatically a secure or safe place to be. It is important to be clear and distinct when discussing security. Security is not a singular concept, solution, or state. It is a combination of numerous aspects, implementations, and perspectives. In fact, security is usually a relative term...

    Sponsored By Global Knowledge

  • White Papers // Aug 2013

    Applying the Four Standards of Security-Based CIA

    As organizations evaluate the available approaches to information security, they need to address a number of considerations in terms of operational, procedural, environmental, and system-related areas. It's no longer about just protecting data. Businesses need to formulate coherent, systematic approaches to security by incorporating regulatory compliance, periodic assessments and the...

    Sponsored By Global Knowledge

  • White Papers // May 2011

    SP1 for Windows 7 and Windows Server 2008 R2: What's New?

    This white paper examines the new features and updates in Service Pack 1 (SP1) for Windows 7 and SP1 for Windows Server 2008 R2, both of which were released on February 22, 2011. Although the two service packs are mostly independent of each other in updates and features, they do...

    Sponsored By Global Knowledge

  • White Papers // May 2011

    14 Security Policy Tips

    Every organization needs a security policy. If you already have one, then there are several important considerations you need to make in regards to your existing security strategy. If you have not yet designed your security policy, here are some important suggestions to integrate into your security stance. If you...

    Sponsored By Global Knowledge

  • White Papers // Sep 2011

    Security Log Analysis: Saving the World, One Company at a Time

    Security logs are dangerous when they are not capturing data, or when the data is not being analyzed regularly and properly. Scouring your security logs, devouring the details, will make you and your organization stronger and there lies the opportunity.

    Sponsored By Global Knowledge

  • White Papers // Aug 2011

    Overlay Transport Virtualization: An Introduction

    Overlay transport virtualization (OTV) can address a lot of challenges presented in today's data center as far as moving components of the data center from one side to the other and making those sites layer 2 adjacent. It enables two data centers that are geographically dispersed to become layer 2...

    Sponsored By Global Knowledge