Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Aug 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

    Sponsored By IBM

  • White Papers // May 2014

    Company Success Through Business Intelligence

    Forrester conducted in-depth surveys and found strong correlations between overall company success and adoption of innovative BI, analytics, and big data tools. In this paper, you will learn what separates the leading companies from the rest when it comes to exploiting innovative technologies in BI and analytics, and what steps...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data Gets Personal: Business Report

    Big data and personal data are converging to shape the Internet's most surprising consumer products. They'll predict your needs and store your memories -- if you let them. Fast-developing methods for collecting and analyzing these types of "big data" promise valuable insights to retailers, urban planners, and for individuals. This...

    Sponsored By SAP

  • White Papers // Jul 2014

    Securing Big Data HADOOP Performance with Vormetric Transparent Encryption

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Apr 2014

    Managing hybrid clouds: A comprehensive, secure, and flexible cloud management solution white paper

    Hybrid cloud delivery brings a fundamental shift to the enterprise, and a new style of IT. The IT department that develops a hybrid delivery model, one that creates an optimal mix of traditional IT, private, and public cloud, is the department that realizes success. Read the white paper and learn...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    Enhancing Cloud Connectivity For Optimal Application Performance

    Increasing dependence on Cloud-based applications hosted in distant data centres makes the quality of backbone networks connecting them increasingly critical. Network quality between Cloud providers and end-users in fact widely varies, and chronically threatens application performance. Differences in carrier network design become more significant as dependence on the Cloud intensifies....

    Sponsored By Level 3 Communications

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes PCI DSS Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet PCI DSS guidelines today and tomorrow. Download...

    Sponsored By Dell Software

  • eBooks // Oct 2013

    3 Compelling Reasons to Consider Desktop Virtualization

    If you have already experienced the benefits of server virtualization, it is time to find out what you can gain by extending virtualization to your desktops. In this eBook, find out how other VMware customers have extended their virtualization deployment to end-user computing and have uncovered significant benefits, such as...

    Sponsored By VMware

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • White Papers // Aug 2014

    Countering Cyber Threats by Modeling "Normal" Website Behavior

    This white paper chronicles the evolution of web and mobile threats, the economic impact of cybercrime and business logic abuse, and how organizations could be leveraging the data in their network to foil the top attacks with behavioral analytics.

    Sponsored By RSA

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    The Big Data Zoo—Taming the Beasts

    With so much talk about big data and the possibilities it can offer, the truth behind what big data is—and what it can do for businesses—can be hard to determine. However, according to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk is not hard to see,...

    Sponsored By IBM

  • White Papers // Mar 2014

    Manage Data Security and Application Threats with a Multi-tiered Approach

    The IBM Security AppScan portfolio includes advanced security testing and a platform for managing application risk, and easily integrates with other IBM Security solutions to provide the end-to-end protection required by today's organizations.

    Sponsored By IBM

  • White Papers // Apr 2014

    Six Keys to Effective Reputational and IT Risk Management (interactive)

    Interactive guide to provide insights on the key actions to take to safeguard your reputation by security and resilience investments.

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Gartner Magic Quadrant: Global Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. This Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute"...

    Sponsored By IBM

  • Downloads // Apr 2014

    Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

    Sponsored By SolarWinds

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Sponsored By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Sponsored By Symantec

  • White Papers // Aug 2014

    The Big Data Service Desk - 3 Ways Big Data Can Transform your Service Desk

    Proactive problem solving. When you connect the intelligence of agents and users, you can analyze trends, anticipate user issues, and adjust to future business needs. Read this white paper and learn how.

    Sponsored By HP

  • White Papers // Sep 2014

    An Automated, Application-Aware Foundation for the Modern Enterprise

    Enterprises have seen massive change over the last decade, but one thing has remained consistent: the Enterprise Network. This article provides insight on an adaptable and programmable network platform to stay ahead of enterprise trends such as BYOD, Cloud Adoption and Xaas

    Sponsored By Cisco Systems

  • White Papers // Oct 2014

    The Seven Stages of Advanced Threats

    Today's advanced threats occur in "kill chains" of up to seven stages. These attacks easily evade traditional filtering and anti-virus defences to steal your organisation’s valuable data. Advanced threats can be stopped at any stage — if you deploy the proper cybersecurity solutions. We've prepared a report to...

    Sponsored By Websense

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing Big Data

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Sep 2014

    Infographic: The Gathering Threat

    A dangerous storm is threatening to swap IT infrastructures. Massive growth of unrestricted content and multiplying content types make it increasingly difficult to consistently manage and identify what to keep. Email, file systems content, digital assets, social, web, ERP data... the list is endless and the threat is real.

    Sponsored By OpenText

  • White Papers // Sep 2014

    Raise Quality Together for Better Software Delivery

    Complexity in software delivery cycles, due to a fast pace of change and new delivery models, presents many challenges -- especially for software testing teams. In this white paper, get advice for requirements validation and testing, and how to adapt to Agile development requirements with automated testing.

    Sponsored By Micro Focus

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jul 2014

    HIPAA Mobile Compliance

    Mobile is becoming a core platform for healthcare communications and services. As information access expands to more people and more devices, mobile creates new systems and processes that are subject to HIPAA compliance. The MobileIron security and management platform includes controls for the following key elements of a HIPAA...

    Sponsored By MobileIron

  • White Papers // Jul 2014

    PCI Compliance and Mobile Devices

    The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014. Merchants and Service Providers that store, process, or transmit customer payment card data must adhere to the revised outlined requirements. Additionally, the...

    Sponsored By MobileIron

  • White Papers // Sep 2014

    Best Practices in Choosing, Implementing and Using MDM and EMM

    Mobility and security specialists are carefully considering enterprise mobility management solutions. This Garner report takes a look at best practices for evaluating and selecting an EMM solution.

    Sponsored By Citrix Online

  • White Papers // Sep 2014

    Comprehensive Enterprise Mobile Management for iOS 8

    The new iOS 8 release includes new features to facilitate device and application management but a third-party enterprise mobility management platform is still necessary for enterprises to gain full control over all their mobile devices and to capitalize on productivity features that enable workflow integration among apps. This white paper...

    Sponsored By Citrix Online

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • eBooks // Aug 2014

    Securing the Small Business Network

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    2013 Threat Report

    This report extensively details and categorizes recent global trends in network threats. The Dell SonicWALL Threat Research Team detected and prevented more than 1.06 trillion IPS related incidents and blocked more than 1.78 billion malwares downloads.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    NGFW Critical to SMB Network

    In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software