Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Downloads // May 2015

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • Webcasts // May 2015

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • White Papers // May 2015

    Tyco Integrated Security: National Crime Infographic

    This helpful and valuable infographics shows the crime trends across the United States and how Tyco Integrated Security helps real world companies achieve their security and business goals. This demonstrates how safe is your business really is by illustrating crime trends and statistics from across the United States that business...

    Provided By Tyco

  • White Papers // May 2015

    Tyco Integrated Security: Overall Crime Index for Your Area

    This helpful and informative Crime Index shows detailed scores that indicate the relative risk of crime at a specific address or site listed as compared to national averages. A Crime Index score of 256 means that the risk of crime at the location is 2.56 times that of the national...

    Provided By Tyco

  • White Papers // May 2015

    Three Best Practices to Help Enterprises Overcome BYOD Challenges

    An increasing number of white-collar workers in the United States use a mobile device for work. This new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges, as well as best practices for ensuring security and productivity.

    Provided By AVI-SPL

  • Case Studies // May 2015

    Schneider Electric Case Study

    Global energy management giant based in France rolled out Box to 67,000 employees, enabled BYOD, and boosted productivity. Use Box for RFPs, vendor collaboration, executives, sales presentations. Cut server costs by 30%. Energy industry, large company, EMEA, global, sales LOB, BYOD, server replacement.

    Provided By Box

  • Case Studies // May 2015

    Dynamic Systems - SkySync Case Study

    Midsize construction company uses Box to collaborate with partners, but uses SharePoint internally. They used SkySync to sync partner portals in Box with SharePoint -- while matching SharePoint's existing security settings and folder structures. Construction company, midsize company, midmarket, SharePoint, SkySync, partner portal, NA, security.

    Provided By Box

  • White Papers // May 2015

    Desktop Workspace: Extending Support for Windows XP-Based Apps

    Discover how to quickly implement secure desktop containers running Windows XP on a Windows 7 or 8 PC, or even on a Mac®. You can centrally manage and tightly lock down your XP environment, and still execute locally to maintain access to those applications for as long as necessary.

    Provided By Dell Software

  • White Papers // May 2015

    Enterprise Mobility Management: Everything You Need to Know About MDM, MAM and BYOD

    If you’re looking for mobile device management (MDM) solutions, are you 100% sure about what your company really needs ? There’s new information available that will help you save money, time and other valuable resources. Read this tech brief about how to maximize your organization’s mobile capabilities so you can...

    Provided By Dell Software

  • White Papers // May 2015

    Implementing Mobility/BYOD While Maintaining Regulatory Compliance

    Discover how to successfully deploy or expand a BYOD program that complies with regulations, avoids data leaks/data loss/unauthorized access, streamlines management and simplifies the process of proving compliance. Read this informative white paper today.

    Provided By Dell Software

  • White Papers // May 2015

    Improve Mobility and BYOD with Enterprise Mobility Management

    Learn how to support mobility business models while providing BYOD capabilities and a high level of security with Enterprise Mobility Management solutions from Dell Software. Watch this informative video.

    Provided By Dell Software

  • Videos // May 2015

    Match Mobility Needs to Your Workforce with Enterprise Mobility Management

    Watch this short video to find out how to tailor your organization's mobility needs to end users, line-of-business owners and IT decision makers with Enterprise Mobility Management solutions from Dell Software.

    Provided By Dell Software

  • Videos // May 2015

    Unlock the Four Layers of Security with Enterprise Mobility Management

    Watch this informative video to learn how to fortify your organization with four layers of security (data loss prevention, data encryption, secure remote access and a firewall) using Dell Enterprise Mobility Management solutions.

    Provided By Dell Software

  • White Papers // May 2015

    The State of Video Conferencing Security

    Video conferencing equipment, found in almost every boardroom around the world, may be opening up companies to serious security breaches. Demonstrations have proved that there is a myriad of information that can be gleaned—from confidential discussions to the ability to zoom in and read top-secret documents—once a video conference system...

    Provided By AVI-SPL

  • White Papers // May 2015

    Private cloud thought leadership WP

    Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value in the deployment and management of private clouds and what CIOs need to know to achieve that...

    Provided By IBM

  • White Papers // May 2015

    Bring ROI to your BYOD - Forrester documents benefits of managed mobility.

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Provided By IBM

  • White Papers // May 2015

    Preparing Your Network for the Mobile Onslaught.

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Provided By IBM

  • Presentations // May 2015

    Five Myths of DIY Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions, from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Provided By IBM

  • Analyst Briefings // May 2015

    Building a Security Incident Response Plan that Works

    Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these...

    Provided By IBM

  • White Papers // May 2015

    Defending Against Increasingly Sophisticated DDoS Attacks

    Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

    Provided By IBM

  • White Papers // May 2015

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

    Provided By F5

  • White Papers // May 2015

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Provided By IBM

  • White Papers // May 2015

    IBM: Consolidated Security Management for Mainframe Clouds

    Organisations today grapple with the expansion of distributed computing, increased online collaboration, explosive data growth and heterogeneous IT environments—all issues that make information security more critical, yet more complex than ever. In this white paper, IBM takes a look at organisations who allow the mainframe to serve as an enterprise...

    Provided By IBM

  • White Papers // May 2015

    Cloud Computing Basics

    In this article we go through some basic concepts with the purpose of providing context for the discussions in the chapters that follow. Here, we review briefly the concept of the cloud as defined by the U.S. National Institute of Standards and Technology, and the familiar terms of IaaS, PaaS,...

    Provided By Intel Corporation

  • White Papers // May 2015

    ENCRYPTING THE INTERNET

    The evolution of the Internet has resulted in large quantities of information being exchanged by businesses or private individuals. The nature of this information is typically both public and private, and much of it is transmitted over the hyper text transfer protocol (HTTP) in an insecure manner. A small amount...

    Provided By Intel Corporation

  • White Papers // May 2015

    ENHANCED DETECTION OF MALWARE

    A signifi cant development in the malware landscape in recent years is the ability of hackers to monetize compromised platforms by (1) gathering valuable information that can be sold, (2) using the platform’s resources to aid in an illicit or unwanted activity, or (3) holding information contained on the platform...

    Provided By Intel Corporation

  • White Papers // May 2015

    ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES

    Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authentication of a hardware device while preserving the privacy of the device owner. A hardware device with an EPID private key embedded can prove to a remote party that it is a valid device, certified by the hardware...

    Provided By Intel Corporation

  • White Papers // May 2015

    Introduction — The Internet of Things

    The Internet of Things (IOT) is about small machines in remote locations speaking to big centralized machines, often making decisions and taking action without people in the loop. It represents billions of devices speaking to each other, often managing outcomes in the physical environment. The IOT presents business opportunities in...

    Provided By Intel Corporation

  • White Papers // May 2015

    1 Platform Boot Integrity: Foundation for Trusted Compute Pools

    This article provides an introduction to the concept of roots of trust in a trusted computing platform, the measured boot process, and the attestation that are critical steps for ensuring boot integrity. It also provides an overview of Intel’s Trusted Executed Technology (TXT), an example of root of trust technology...

    Provided By Intel Corporation

  • White Papers // May 2015

    Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance

    With application storage requirements growing at a tremendous rate, costs are skyrocketing while IT budgets are flat or declining. Today’s IT environments require storage solutions that have superior performance with lower initial and ongoing costs, along with high levels of integration between storage and application infrastructure to minimise onsite testing...

    Provided By Oracle

  • White Papers // May 2015

    Best Practices for Security and Compliance with Amazon Web Services

    Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

    Provided By Trend Micro

  • White Papers // May 2015

    Why a New Business Model is Needed for SSL Certificates

    The de facto Internet communication security protocol in use today is Secure Sockets Layer (SSL), used most commonly for browser-to-Web server communications, but increasingly for connections between applications when transferring critical business content.

    Provided By Trend Micro

  • White Papers // May 2015

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Provided By Trend Micro

  • White Papers // May 2015

    Multifunction Device Buyer's Guide

    A buyer's guide that evaluates in choosing a multi-function device and clearly define requirements. Read this report and learn how to address the benefits in total cost of ownership.

    Provided By Fuji Xerox

  • White Papers // May 2015

    Solutions as individual as you and your workplace: Fuji Xerox Australia

    A short video that shows how Fuji Xerox Australia can help the way you work and keep your business moving.

    Provided By Fuji Xerox

  • White Papers // May 2015

    Big Data Predictive analytics solutions, Q1 2013

    Vendors must rise to the challenge of big data predictive analytics; the big data market is growing as organizations scramble to harness predictive analytics; and big data handling, modeling tools, and algortihsm are key to differentiators

    Provided By SAP

  • White Papers // May 2015

    Operationalizing the Buzz: Big Data 2013

    The 2013 EMA/9sight Big Data research makes a clear case for the maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy adoption and use to explore why and how companies are utilizing Big Data.

    Provided By SAP

  • White Papers // May 2015

    Data Center Encryption Survey

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Provided By SafeNet

  • White Papers // May 2015

    Contextual Authentication: A Multi-factor Approach

    Increases in roaming user populations and remote access to organizations' confidential data is becoming a larger security concern, leaving organizations with choices to make about how to secure these resources. A conflict of interest between business groups and IT security can create a struggle to maintain usability while increasing security....

    Provided By Pistol's Plumbing & Maint. Inc.

  • White Papers // May 2015

    Two-factor Authentication: A Tokenless Approach

    PortalGuard is a software solution designed as a strong authentication platform, consisting of five layers including two-factor authentication, single sign-on, self-service password management, contextual authentication, and password synchronization, used for protecting browser-based applications which are hosted within an Intranet and/or outside the firewall, now commonly known as the cloud. These...

    Provided By Pistol's Plumbing & Maint. Inc.