Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
What is Adaptive Redaction - Video
Information management can become extremely complex and costly, but with effective Information Governance policy in place, you can stay ahead of the competition and uncover opportunities to drive busi...
Sponsored By Clearswift
-
The Enemy Within - Infographic
Research information from 300 IT decision makers in companies of various sizes in the UK across three key sectors: defence/aerospace, local government and finance/banking to identify the key security ...
Sponsored By Clearswift
-
The Enemy Within - Blog
Read the blog announcement of the research report 'The Enemy Within', conducted to review the extent to which internal threats are affecting UK organisations.
Sponsored By Clearswift
-
Controlling and Managing Superuser Access
“Super users” – those people with greater access and rights – are a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and eas...
Sponsored By Dell Software
-
Freeform Dynamics Report - The End User Security Jigsaw
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard...
Sponsored By McAfee
-
SANS Survey on Mobility/BYOD Security Policies and Practices
In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet...
Sponsored By McAfee
-
McAfee Enterprise Mobility Management Solution Brief
How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints...
Sponsored By McAfee
-
Access Control Is Easy, Use Active Directory Groups and Manage Them Well
Good access control? It’s not about assigning permissions to Active Directory (AD). It really comes down to avoiding the use of local groups (whether on Windows file servers, in Microsoft SQL Server, ...
Sponsored By Dell
-
Identity and Access Management Buyer's Guide
This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address th...
Sponsored By IBM
-
2013 Gartner Magic Quadrant for SIEM
IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirement...
Sponsored By IBM
-
Case Study: Specsavers- scalability, flexibility & simplicity
With its dramatic growth over the last 10 years, staff numbers continue to grow, as does the need for secure remote access. So Specsavers required a secure remote access solution that would be: - Sca...
Sponsored By SafeNet, Inc.
-
Creating the Ultimate Security Platform
It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every d...
Sponsored By IBM
-
Whitepaper: Multifactor authentication - Current usage and trends
This white paper draws on a large survey to provide a current picture of the authentication landscape in Europe, the Middle East, and Africa (EMEA), and it offers insights into how this landscape is e...
Sponsored By SafeNet, Inc.
-
Infographic: Deploying authentication to 20k users over a coffee
Gartner predicts that, by 2017, more than 50% of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementation, up from less than 10% toda...
Sponsored By SafeNet, Inc.
-
Counter Stealth Attacks
The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they do...
Sponsored By McAfee
-
American Eurocopter: Meeting Government Regulations for Asset Management
American Eurocopter Corporation manufactures, sells, supports, and pro- vides training solutions for Eurocopter rotary-wing aircraft in the United States for civilian, law enforcement, military, and h...
Sponsored By SAP
-
Best Practices in Data Protection Monitoring
Regardless of whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. It should not come as a surprise that, accordin...
Sponsored By EMC
-
IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps
With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integra...
Sponsored By IBM
-
Gartner 2013 Magic Quadrant for Application Security Testing
Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Lead...
Sponsored By IBM
-
IBM Security Intrusion Preventions Solutions
As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, p...
Sponsored By IBM
-
Beyond the Next Generation: Putting Advanced Network Security To Work
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabili...
Sponsored By IBM
-
2012 IBM X-Force Annual Trend and Risk Report
The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet ...
Sponsored By IBM
-
Chalk Talk Video Series (3): Ensuring Data Protection with VMware
Chris Westphal, VMware Sr. Marketing Manager discusses your options in protecting critical business data with data protection solutions from VMware.
Sponsored By VMware
-
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs
Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizat...
Sponsored By FireEye
-
Four EHR Change-Management Mistakes (And How To Avoid Them)
Careful planning and effective change management can help keep missteps - and the stress and costs that come with them - to a minimum when implementing electronic health records (EHR). This report pr...
Sponsored By HP and Intel®
-
Ransomware: Hijacking Your Data
Since 2011, users have increasingly seen messages warning that their computer is locked and demanding money in exchange for access to their PCs, purportedly from the FBI and police agencies. These are...
Sponsored By Sophos
-
Eight Trends That Are Changing Network Security
New mobile operating systems, growing use of personal devices, and SaaS (software-as-a-service) delivery make securing the network a growing challenge. We’re seeing ever faster network connections, mo...
Sponsored By Sophos
-
BlackBerry Security Response - Protecting Your Deployments
Wondering exactly how BlackBerry® protects against and responds to security threats? Join this webcast to hear about trends that are contributing to increases in mobile malware and data leakage risks ...
Sponsored By BlackBerry
-
BlackBerry 10 Security: Nuts and Bolts
Curious about how BlackBerry? Balance is built into the core of the QNX-based BlackBerry? 10 operating system? Want to understand exactly what makes BlackBerry? the gold standard for security end-to-e...
Sponsored By BlackBerry
-
Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
For many organizations, creating a secure, auditable, archived and compliant Enterprise Mobile Management (EMM) solution is a must. This webcast will explore the options available with BlackBerry® Ent...
Sponsored By BlackBerry
-
Enterprise Solution Design for SAP HANA
This paper provides insights regarding the importance of defining the reference architecture, development standards, modeling and security approaches, and implementation methodologies for implementing...
Sponsored By HP & Intel® Xeon® Processors
-
HP AppSystems for SAP HANA Use Case: Utilities
See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy effici...
Sponsored By HP & Intel® Xeon® Processors
-
Building A Web Security Architecture
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s ...
Sponsored By Blue Coat Systems
-
Emerging Mobile Security Challenges
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one th...
Sponsored By Blue Coat Systems
-
Protection for Every Enterprise: How BlackBerry 10 Security Works
If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list of requirements. And if you’re in IT, you don't just want the highlights – y...
Sponsored By BlackBerry
-
BlackBerry 10 Security - What IT Needs To Know
Discover how BlackBerry® Security covers the full range of security needs cross-platform, with data leakage protection, certified encryption, BlackBerry® Balance™ and containerization. Plus, find out ...
Sponsored By BlackBerry
-
Security Empowers Business
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of ...
Sponsored By Blue Coat Systems
-
Enhance IT Security with SolarWinds® Log & Event Manager
What will you do when the security systems implemented to secure your IT environment are not secure anymore? Do you know what’s lurking in your network to exploit vulnerabilities and compromise IT sec...
Sponsored By SolarWinds
-
How to unleash the value of your scanned documents
Have your scanned documents become a digital landfill? Is an unmanaged assortment of files threatening to become an avalanche in your office? This ebook provides insight into how to get control of y...
Sponsored By VirtualWorks
-
IBM Ready Pack for Cloud: Helping SMBs Manage Growth and Costs
The IBM Ready Pack for Cloud enables small and medium businesses (SMBs) to achieve operational efficiencies and faster time to market. This solution empowers small IT staff to rapidly deliver a virtua...
Sponsored By IBM
-
Hacking Back in Self-Defense: Is It legal? Should It Be?
Hacking? Bots? The bottom-line is we are losing the war. Businesses must be able to defend themselves to prevent the loss of money, technology, and secrets. As new laws are explored, old ones amended,...
Sponsored By Global Knowledge
-
ESG Whitepaper - Virtualization moves the SMB market forward
The whitepaper talks about the pressures that SMB is facing --including small budgets, limited skill sets among IT staff, and limitations in their existing processes. But today, they have opportunitie...
Sponsored By VMware
-
Virtualized Security: The Next Generation
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the...
Sponsored By Blue Coat Systems
-
Building A Web Security Architecture
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s ...
Sponsored By Blue Coat Systems
-
Emerging Mobile Security Challenges
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one th...
Sponsored By Blue Coat Systems
-
IBM zSecure Compliance and Administration
IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified secur...
Sponsored By IBM
-
IPS: Evolving to Remain Relevant
With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker ...
Sponsored By IBM
-
Beyond the Next Generation: Meeting the Converging Demands of Network Security
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way...
Sponsored By IBM
-
Demystifying Switch-based ACLs
Access Control Lists (ACLs) are a common staple of Cisco networking, traffic control, and security topics. Access-list configuration and deployment on routers is familiar to most network professionals...
Sponsored By Global Knowledge
-
Managing Access Security in a Multi-Perimeter World
Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new i...
Sponsored By IBM
-
Managing identities and access in the cloud
The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cl...
Sponsored By IBM
-
Consolidated security management for mainframe clouds
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centraliz...
Sponsored By IBM
-
Identity and Access Intelligence: Transforming Enterprise Security
In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security ev...
Sponsored By IBM
-
Application security and risk management
To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor ...
Sponsored By IBM
-
Integrating Security into Development, No Pain Required
In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application fu...
Sponsored By IBM
-
How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security Profiles
Web-based systems can compromise the overall security of an organization by introducing vulnerabilities that hackers can use to gain access to confidential company information. In addition, the growth...
Sponsored By IBM
-
Safeguarding the cloud with IBM Security solutions
Maintain visibility and control with proven security solutions for public, private and hybrid clouds
Sponsored By IBM
-
Top Ten Cybersecurity Risks: How Prepared Are you for 2013?
Rather than looking back over the past year, organizations and individuals need to start assessing cyber security threats that lie ahead in the New Year. While there is always the chance for a new thr...
Sponsored By Global Knowledge
-
Intelligent role management for improved security and compliance
In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role...
Sponsored By IBM
-
IBM Identity and Access Management
This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data a...
Sponsored By IBM
-
Secure By Design: Building Identity-based Security into Today’s Information Systems
In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the ...
Sponsored By IBM
-
Mitigating Insider Threats
IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automate...
Sponsored By IBM
-
Ransomware: Hijacking Your Data
Since 2011, users have increasingly seen messages warning that their computer is locked and demanding money in exchange for access to their PCs, purportedly from the FBI and police agencies. These are...
Sponsored By Sophos
-
Eight Trends That Are Changing Network Security
New mobile operating systems, growing use of personal devices, and SaaS (software-as-a-service) delivery make securing the network a growing challenge. We’re seeing ever faster network connections, mo...
Sponsored By Sophos
-
How web application vulnerability assessment tools can improve enterprise security
This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.
Sponsored By IBM
-
Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications an...
Sponsored By IBM
-
Time Tracking Product Preview
With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.
Sponsored By Workday
-
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs
Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizat...
Sponsored By FireEye
-
Stay Ahead of Insider Threats with Predictive, Intelligent Security
It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combinat...
Sponsored By IBM
-
Extending Security Intelligence with Big Data
Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere BigInsights technologies helping organizations address the most vexing security challenges, ...
Sponsored By IBM
-
IT Executive Guide to Security Intelligence
This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agenci...
Sponsored By IBM
-
Delivering Success that Scales with the Largest Enterprises
IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar ® Security Intelligence Platform collects, c...
Sponsored By IBM
-
Chalk Talk Video Series (3): Ensuring Data Protection with VMware
Chris Westphal, VMware Sr. Marketing Manager discusses your options in protecting critical business data with data protection solutions from VMware.
Sponsored By VMware
-
IBM Security Intrusion Preventions Solutions
As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, p...
Sponsored By IBM
-
Beyond the Next Generation: Putting Advanced Network Security To Work
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabili...
Sponsored By IBM
-
2012 IBM X-Force Annual Trend and Risk Report
The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet ...
Sponsored By IBM
-
Ponemon Institute Research Report: The Post Breach Boom
This groundbreaking study from Ponemon Institute polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-maliciou...
Sponsored By Blue Coat Systems
-
Ten Steps to Better, Stronger Passwords
Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are ...
Sponsored By Global Knowledge
-
Taneja Group Executive Summary: An overview of the Virtualization and Cloud Market Vendor Landscape for Small and Medium Businesses
Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users (companies with less than 1000 employees). This executive summary evaluate...
Sponsored By VMware
-
Secure Web Gateways Buyer's Guide
The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the vol...
Sponsored By Blue Coat Systems