Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
Three Ways to Improve Your Data Storage Capabilities
Every company is interested in capturing, analyzing and taking action on data. Unfortunately, many data solutions and partners promise the world but offer very little. Whether you're thinking of switc...
Sponsored By EMC
-
Virtualized Security: The Next Generation
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the...
Sponsored By Blue Coat Systems
-
Virtualized Security: The Next Generation of Consolidation
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the...
Sponsored By Blue Coat Systems
-
Secure Web Gateway Buyers Guide
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solut...
Sponsored By Blue Coat Systems
-
Password Change Service - Avaya CallPilot
Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator ...
Sponsored By Global Knowledge
-
Secure Web Gateways Buyer's Guide
The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the vol...
Sponsored By Blue Coat Systems
-
Legal Issues of Cloud Forensics
Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. If they need to collect information from the cloud t...
Sponsored By Global Knowledge
-
Time Tracking Product Preview
With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.
Sponsored By Workday
-
Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Center: EMC Best Practices in Data Protection Monitoring
Regardless of whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. It should not come as a surprise that, accordin...
Sponsored By EMC
-
Managing Access Security in a Multi-Perimeter World
Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new i...
Sponsored By IBM
-
Managing identities and access in the cloud
The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cl...
Sponsored By IBM
-
Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications an...
Sponsored By IBM
-
IPS: Evolving to Remain Relevant
With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker ...
Sponsored By IBM
-
Consolidated security management for mainframe clouds
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centraliz...
Sponsored By IBM
-
Identity and Access Intelligence: Transforming Enterprise Security
In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security ev...
Sponsored By IBM
-
Stay Ahead of Insider Threats with Predictive, Intelligent Security
It has become more important to secure critical information and related assets from insider threats. IBM has the ability to identify and protect against internal threats through a distinctive combinat...
Sponsored By IBM
-
Extending Security Intelligence with Big Data
Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere BigInsights technologies helping organizations address the most vexing security challenges, ...
Sponsored By IBM
-
IT Executive Guide to Security Intelligence
This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agenci...
Sponsored By IBM
-
Delivering Success that Scales with the Largest Enterprises
IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar ® Security Intelligence Platform collects, c...
Sponsored By IBM
-
IBM zSecure Compliance and Administration
IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified secur...
Sponsored By IBM
-
How web application vulnerability assessment tools can improve enterprise security
This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.
Sponsored By IBM
-
Beyond the Next Generation: Meeting the Converging Demands of Network Security
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way...
Sponsored By IBM
-
Application security and risk management
To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor ...
Sponsored By IBM
-
Integrating Security into Development, No Pain Required
In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application fu...
Sponsored By IBM
-
How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security Profiles
Web-based systems can compromise the overall security of an organization by introducing vulnerabilities that hackers can use to gain access to confidential company information. In addition, the growth...
Sponsored By IBM
-
Safeguarding the cloud with IBM Security solutions
Maintain visibility and control with proven security solutions for public, private and hybrid clouds
Sponsored By IBM
-
Intelligent role management for improved security and compliance
In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role...
Sponsored By IBM
-
IBM Identity and Access Management
This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data a...
Sponsored By IBM
-
Secure By Design: Building Identity-based Security into Today’s Information Systems
In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the ...
Sponsored By IBM
-
Mitigating Insider Threats
IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automate...
Sponsored By IBM
-
Ponemon Institute Research Report: The Post Breach Boom
This groundbreaking study from Ponemon Institute polled 3,529 IT and IT security professionals in eight countries to understand the steps they are taking in the aftermath of malicious and non-maliciou...
Sponsored By Blue Coat Systems
-
Optimise your online business - A best practice guide
This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach da...
Sponsored By Symantec
-
Top Ten Cybersecurity Risks: How Prepared Are you for 2013?
Rather than looking back over the past year, organizations and individuals need to start assessing cyber security threats that lie ahead in the New Year. While there is always the chance for a new thr...
Sponsored By Global Knowledge
-
Demystifying Switch-based ACLs
Access Control Lists (ACLs) are a common staple of Cisco networking, traffic control, and security topics. Access-list configuration and deployment on routers is familiar to most network professionals...
Sponsored By Global Knowledge
-
Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s ...
Sponsored By Blue Coat Systems
-
Windows Server 2012 and the Resilient File System (ReFS)
Over the past 20 years, NTFS has become the de facto standard for a Microsoft enterprise file system. With the introduction of Windows Server 2012, Microsoft has released its latest file system, Resil...
Sponsored By Global Knowledge
-
Mobile Security Challenge Emerges
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one th...
Sponsored By Blue Coat Systems
-
IP Version 6 Address Types
In 1998, the Internet Engineering Task Force (IETF) released RFC 2460, outlining the technical specifications of IPv6, which addressed the shortcomings of the aging IPv4 protocol. As with any evolutio...
Sponsored By Global Knowledge
-
Phishing: How to protect your business
You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosys...
Sponsored By Symantec
-
802.1X Explained
BYOD (Bring your own Device) is the term we have tried to put in the furthest, darkest place in our mind. Why do we react this way? The answer is that change scares us. Today, we are going to embark o...
Sponsored By Global Knowledge
-
The Competitive Edge: Powerful Application Solutions for CRM and ERP
Enabling midsize companies to realize their potential in this globally integrated economy, midsize businesses need to take advantage of emerging opportunities. IBM and its Business Partners understand...
Sponsored By IBM
-
VMware vCenter Converter: Overview, P2V Tips, and Security Concerns
vCenter Converter is becoming more robust and powerful with each new revision, and this white paper examines many common problems and possible solutions. Most systems can be virtualized, and the perce...
Sponsored By Global Knowledge
-
Ten New Topics on Security+ 2011 (SY0-301) (Domain 1.0: Network Security)
The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated and covers 60 new topics not present in the previous version of the exam. The first topical domain: Network Security, is ever e...
Sponsored By Global Knowledge
-
Ten Steps to Better, Stronger Passwords
Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are ...
Sponsored By Global Knowledge
-
802.1X Explained
BYOD (Bring your own Device) is the term we have tried to put in the furthest, darkest place in our mind. Why do we react this way? The answer is that change scares us. Today, we are going to embark o...
Sponsored By Global Knowledge
-
IP Version 6 Address Types
In 1998, the Internet Engineering Task Force (IETF) released RFC 2460, outlining the technical specifications of IPv6, which addressed the shortcomings of the aging IPv4 protocol. As with any evolutio...
Sponsored By Global Knowledge
-
Four EHR Change-Management Mistakes (And How To Avoid Them)
Careful planning and effective change management can help keep missteps - and the stress and costs that come with them - to a minimum when implementing electronic health records (EHR). This report pr...
Sponsored By HP and Intel®
-
TechRepublic's Geek Gift Guide 2009
Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic onc...
Sponsored By TechRepublic
-
BlackBerry Security Response - Protecting Your Deployments
Wondering exactly how BlackBerry® protects against and responds to security threats? Join this webcast to hear about trends that are contributing to increases in mobile malware and data leakage risks ...
Sponsored By BlackBerry
-
BlackBerry 10 Security: Nuts and Bolts
Curious about how BlackBerry? Balance is built into the core of the QNX-based BlackBerry? 10 operating system? Want to understand exactly what makes BlackBerry? the gold standard for security end-to-e...
Sponsored By BlackBerry
-
Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
For many organizations, creating a secure, auditable, archived and compliant Enterprise Mobile Management (EMM) solution is a must. This webcast will explore the options available with BlackBerry® Ent...
Sponsored By BlackBerry
-
Enhance IT Security with SolarWinds® Log & Event Manager
What will you do when the security systems implemented to secure your IT environment are not secure anymore? Do you know what’s lurking in your network to exploit vulnerabilities and compromise IT sec...
Sponsored By SolarWinds
-
Arguments Against Virtualization - And Why They Are Wrong
There are many misconceptions about virtualization and its effect on applications and the existing infrastructure. Most of these misconceptions are the result of bad information, not enough informatio...
Sponsored By Global Knowledge
-
14 Security Policy Tips
Every organization needs a security policy. If you already have one, then there are several important considerations you need to make in regards to your existing security strategy. If you have not yet...
Sponsored By Global Knowledge
-
New Topics on Security SY0-301 from Domains 2.0-6.0
The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated; the revamped exam focuses more on risk, operational security, and mobile device security. It also clearly emphasizes security ...
Sponsored By Global Knowledge
-
Security Empowers Business
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of ...
Sponsored By Blue Coat Systems
-
Taneja Group Executive Summary: An overview of the Virtualization and Cloud Market Vendor Landscape for Small and Medium Businesses
Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users (companies with less than 1000 employees). This executive summary evaluate...
Sponsored By VMware
-
Windows 7 and AppLocker
AppLocker represents some significant improvements to Software Restriction Policies. The ability to use digital signature information, the ability to use greater-than and less-than operators for versi...
Sponsored By Global Knowledge
-
Overlay Transport Virtualization: An Introduction
Overlay transport virtualization (OTV) can address a lot of challenges presented in today's data center as far as moving components of the data center from one side to the other and making those sites...
Sponsored By Global Knowledge
-
Security Log Analysis: Saving the World, One Company at a Time
Security logs are dangerous when they are not capturing data, or when the data is not being analyzed regularly and properly. Scouring your security logs, devouring the details, will make you and your ...
Sponsored By Global Knowledge
-
Hacking Back in Self-Defense: Is It legal? Should It Be?
Hacking? Bots? The bottom-line is we are losing the war. Businesses must be able to defend themselves to prevent the loss of money, technology, and secrets. As new laws are explored, old ones amended,...
Sponsored By Global Knowledge
-
ESG Whitepaper - Virtualization moves the SMB market forward
The whitepaper talks about the pressures that SMB is facing --including small budgets, limited skill sets among IT staff, and limitations in their existing processes. But today, they have opportunitie...
Sponsored By VMware
-
Secure Web Gateways Buyer's Guide
The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the vol...
Sponsored By Blue Coat Systems
-
IBM Ready Pack for Cloud: Helping SMBs Manage Growth and Costs
The IBM Ready Pack for Cloud enables small and medium businesses (SMBs) to achieve operational efficiencies and faster time to market. This solution empowers small IT staff to rapidly deliver a virtua...
Sponsored By IBM
-
Seven Security Myths of Windows 7
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network an...
Sponsored By Global Knowledge
-
Three Ways to Improve Your Data Storage Capabilities
Every company is interested in capturing, analyzing and taking action on data. Unfortunately, many data solutions and partners promise the world but offer very little. Whether you're thinking of switc...
Sponsored By EMC
-
Phishing: How to protect your business
You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosys...
Sponsored By Symantec
-
Optimise your online business - A best practice guide
This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach da...
Sponsored By Symantec
-
Mobile Security Challenge Emerges
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one th...
Sponsored By Blue Coat Systems
-
Virtualized Security: The Next Generation of Consolidation
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the...
Sponsored By Blue Coat Systems
-
Secure Web Gateway Buyers Guide
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solut...
Sponsored By Blue Coat Systems
-
Password Change Service - Avaya CallPilot
Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator ...
Sponsored By Global Knowledge
-
American Eurocopter: Meeting Government Regulations for Asset Management
American Eurocopter Corporation manufactures, sells, supports, and pro- vides training solutions for Eurocopter rotary-wing aircraft in the United States for civilian, law enforcement, military, and h...
Sponsored By SAP
-
Access Control Is Easy, Use Active Directory Groups and Manage Them Well
Good access control? It’s not about assigning permissions to Active Directory (AD). It really comes down to avoiding the use of local groups (whether on Windows file servers, in Microsoft SQL Server, ...
Sponsored By Dell
-
IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps
With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integra...
Sponsored By IBM
-
Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Center: EMC Best Practices in Data Protection Monitoring
Regardless of whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. It should not come as a surprise that, accordin...
Sponsored By EMC
-
Best Practices in Data Protection Monitoring
Regardless of whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. It should not come as a surprise that, accordin...
Sponsored By EMC
-
Gartner 2013 Magic Quadrant for Application Security Testing
Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Lead...
Sponsored By IBM
-
Identity and Access Management Buyer's Guide
This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address th...
Sponsored By IBM
-
2013 Gartner Magic Quadrant for SIEM
IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirement...
Sponsored By IBM