Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Sponsored By Centrify

  • White Papers // Aug 2013

    Top 10 Tips to Make SaaS Access Secure at Your Enterprise

    So you want seamless login from your enterprise applications to Software-as-a-Service (SaaS) applications in the cloud? There are many options available, ranging from open source to stand-alone SSO gateway products. The days of custom coding of proprietary or open source access to partners or hosted application providers are gone. Read...

    Sponsored By McAfee

  • White Papers // Aug 2013

    Applying the Four Standards of Security-Based CIA

    As organizations evaluate the available approaches to information security, they need to address a number of considerations in terms of operational, procedural, environmental, and system-related areas. It's no longer about just protecting data. Businesses need to formulate coherent, systematic approaches to security by incorporating regulatory compliance, periodic assessments and the...

    Sponsored By Global Knowledge

  • White Papers // Aug 2013

    Survey: Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Sponsored By Webroot Software

  • White Papers // Aug 2013

    The Wild World of Malware: Keeping your Company Safe Inside

    While many types of malware have become familiar, new threats continue to evolve as hackers are forced to adapt. No longer just the foray of anti-social types trying to impress their peers or act out against authority, malware is now the business of organized, transnational gangs who are in it...

    Sponsored By Dell Software

  • Downloads // Aug 2013

    Download a Free AppAssure 5 Trial

    Designed for virtual, physical and cloud environments, Dell AppAssure 5 provides continual data and application backups and flexible recovery options for unparalleled data protection.

    Download a Free Trial!

    Sponsored By Dell

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Aug 2013

    Protecting Exchange: Best practices and Practical Tips

    While disaster recovery and business continuity plans are necessary, they do not constitute a comprehensive and effective email data protection strategy. A good data-protection strategy must prevent the loss or corruption of mission-critical data. But the best data protection is really about minimizing downtime. According to a 2011 Forrester survey,...

    Sponsored By Dell

  • White Papers // Aug 2013

    Data Protection: Evaluating Business Requirements and Classifying Your Data

    Protecting your company’s data and applications means much more than just running a simple backup routine. It is about protecting your business assets throughout their lifecycle – in terms of preservation, recoverability and availability. A complete data-protection approach can help your company adapt to rapidly changing opportunities and environments, including:

    Sponsored By Dell

  • White Papers // Aug 2013

    Windows Azure™ Security Overview

    Windows Azure, as an application hosting platform, must provide confidentiality, integrity, and availability of customer data. It must also provide transparent accountability to allow customers and their agents to track administration of services, by themselves and by Microsoft. This document describes the array of controls implemented within Windows Azure, so...

    Sponsored By Microsoft

  • Videos // Aug 2013

    What is Adaptive Redaction? - Video

    Information management can become extremely complex and costly if not managed efficiently, but with effective Information Governance policy in place, you can stay ahead of the competition and uncover opportunities to drive business value. Adaptive Redaction is your assurance that critical information is kept safe. Learn more about Adaptive Redaction.

    Sponsored By Clearswift

  • White Papers // Aug 2013

    The Enemy Within: an emerging threat - Blog

    Read the blog announcement of the research report 'The Enemy Within', conducted to review the extent to which internal threats are affecting UK organisations.

    Sponsored By Clearswift

  • White Papers // Aug 2013

    The Enemy Within: an emerging threat - Infographic

    Research information from 300 IT decision makers in companies of various sizes in the UK across three key sectors: defence/aerospace, local government and finance/banking to identify the key security concerns and how they are being managed.

    Sponsored By Clearswift

  • White Papers // Aug 2013

    Multi-Step Authentication and Why You Should Use It

    Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). Authentication is the process of claiming an identity the proving that you are that claimed identity. Authorization is the mechanism to control what you can access or...

    Sponsored By Global Knowledge

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    “Super users” – those people with greater access and rights – are a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Especially with today’s security and compliance concerns, effectively managing privileged accounts is...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Access Control Is Easy, Use Active Directory Groups and Manage Them Well

    Good access control? It’s not about assigning permissions to Active Directory (AD). It really comes down to avoiding the use of local groups (whether on Windows file servers, in Microsoft SQL Server, in SharePoint, etc). In this new white paper, see why AD groups are at the center of the...

    Sponsored By Dell

  • White Papers // Aug 2013

    5 Tips to Choosing the Right Business Phone System

    IP phone and unified communications solutions have evolved to allow businesses to leverage powerful applications and technologies in an effort to improve productivity and boost success.

    Organizations large and small have a wide array of phone systems to choose from, and business-decision makers need to consider numerous factors when...

    Sponsored By ShoreTel

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements.

    Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Jul 2013

    Counter Stealth Attacks

    The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they don’t have a problem. Without something to “fix,” cost justifying these systems has seemed difficult and unnecessary—until the company falls...

    Sponsored By McAfee

  • White Papers // Jul 2013

    How To Secure Online Activities

    The Internet is not automatically a secure or safe place to be. It is important to be clear and distinct when discussing security. Security is not a singular concept, solution, or state. It is a combination of numerous aspects, implementations, and perspectives. In fact, security is usually a relative term...

    Sponsored By Global Knowledge

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jul 2013

    2012 IBM X-Force Annual Trend and Risk Report

    The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They...

    Sponsored By IBM

  • White Papers // Jul 2013

    Emerging Security Trends and Risks. Insights for the Security Executive

    For the busy executive, security is not an issue that can simply be delegated; it must be embraced as another important component of any plan for doing business in an increasingly complex and technology-driven world.

    Sponsored By IBM

  • Videos // Jul 2013

    Chalk Talk Video Series (3): Ensuring Data Protection with VMware

    Chris Westphal, VMware Sr. Marketing Manager discusses your options in protecting critical business data with data protection solutions from VMware.

    Sponsored By VMware

  • White Papers // Jul 2013

    Four EHR Change-Management Mistakes (And How To Avoid Them)

    Careful planning and effective change management can help keep missteps - and the stress and costs that come with them - to a minimum when implementing electronic health records (EHR).  This report presents strategies for avoiding common problems as you select technology, choose your implementation team, assign responsibilities and lay...

    Sponsored By HP and Intel®

  • Webcasts // Jun 2013

    BlackBerry 10 Security: Nuts and Bolts

    Curious about how BlackBerry? Balance is built into the core of the QNX-based BlackBerry? 10 operating system? Want to understand exactly what makes BlackBerry? the gold standard for security end-to-end mobility? Wondering about the advanced security controls for high-security and regulated industries, managed through BlackBerry? Enterprise Service 10? If you...

    Sponsored By BlackBerry

  • Webcasts // Jun 2013

    Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10

    For many organizations, creating a secure, auditable, archived and compliant Enterprise Mobile Management (EMM) solution is a must. This webcast will explore the options available with BlackBerry® Enterprise Service 10, including the newly introduced ‘Enterprise Mobile Management – Regulated’ option and third-party tools for security mobile auditing, archiving and forensics....

    Sponsored By BlackBerry

  • Webcasts // Jun 2013

    BlackBerry Security Response - Protecting Your Deployments

    Wondering exactly how BlackBerry® protects against and responds to security threats? Join this webcast to hear about trends that are contributing to increases in mobile malware and data leakage risks for enterprises. Then, find out how security response is a key part of the BlackBerry approach to enterprise mobility management.

    Sponsored By BlackBerry

  • White Papers // Jun 2013

    IDC Technology Spotlight Delivering Endpoint Integration and Control

    Organizations are struggling to keep pace with a constantly evolving threat landscape, while also keeping a firm grip on an ever-expanding array of devices, software, applications, hardware and user profiles.

    This Technology Spotlight explores the benefits that integrated endpoint security platforms with centralized management control offer organizations. This paper...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Build Your IT Security Business Case

    The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security.

    In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data Under Siege: Guard the Gaps with Patch Management

    Are you guarding the cybersecurity gaps with patch management?

    How often do your employees select "install" when they get a notification pop-up message and how often do they choose the "later" option? According to Kaspersky Lab research, more than 70 percent of users of the most vulnerable programs (Adobe...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data Under Siege: Defend It with Encryption

    Is your cyber security doing enough to protect your new, hyper-mobile business practices?

    Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming...

    Sponsored By Kaspersky Lab

  • White Papers // Oct 2011

    VMware vCenter Converter: Overview, P2V Tips, and Security Concerns

    vCenter Converter is becoming more robust and powerful with each new revision, and this white paper examines many common problems and possible solutions. Most systems can be virtualized, and the percentage is increasing with each new version of the Converter. As older, legacy systems are replaced with more agile applications,...

    Sponsored By Global Knowledge

  • White Papers // Oct 2011

    Ten New Topics on Security+ 2011 (SY0-301) (Domain 1.0: Network Security)

    The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated and covers 60 new topics not present in the previous version of the exam. The first topical domain: Network Security, is ever evolving and this paper addresses 10 important topics that you need to focus on as you prepare for...

    Sponsored By Global Knowledge

  • White Papers // Nov 2011

    Hacking Back in Self-Defense: Is It legal? Should It Be?

    Hacking? Bots? The bottom-line is we are losing the war. Businesses must be able to defend themselves to prevent the loss of money, technology, and secrets. As new laws are explored, old ones amended, and solutions sought, let's think outside the box and give the good guys the advantage, or...

    Sponsored By Global Knowledge

  • White Papers // Feb 2012

    Arguments Against Virtualization - And Why They Are Wrong

    There are many misconceptions about virtualization and its effect on applications and the existing infrastructure. Most of these misconceptions are the result of bad information, not enough information, or simply preconceived notions that are not founded in reality. This white paper separates fact from fiction on five of the big...

    Sponsored By Global Knowledge

  • White Papers // Feb 2012

    New Topics on Security SY0-301 from Domains 2.0-6.0

    The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated; the revamped exam focuses more on risk, operational security, and mobile device security. It also clearly emphasizes security in three main areas: application, data, and host. In preparing for SY0-301, it would be good to pay special attention to the...

    Sponsored By Global Knowledge

  • White Papers // May 2012

    Seven Security Myths of Windows 7

    Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do...

    Sponsored By Global Knowledge

  • White Papers // Mar 2012

    Mind the Gap: What is an ITIL® Gap Analysis?

    Organizations adopting ITIL best practices almost always ask, "Where do I begin?". The answer is a gap analysis. ITIL describes a gap analysis as a means of identifying areas where an organization falls short of its long-term vision. This white paper describes what a gap analysis is, what it entails,...

    Sponsored By Global Knowledge

  • Downloads // Aug 2013

    Download a Free AppAssure 5 Trial

    Designed for virtual, physical and cloud environments, Dell AppAssure 5 provides continual data and application backups and flexible recovery options for unparalleled data protection.

    Download a Free Trial!

    Sponsored By Dell

  • White Papers // Aug 2013

    Access Control Is Easy, Use Active Directory Groups and Manage Them Well

    Good access control? It’s not about assigning permissions to Active Directory (AD). It really comes down to avoiding the use of local groups (whether on Windows file servers, in Microsoft SQL Server, in SharePoint, etc). In this new white paper, see why AD groups are at the center of the...

    Sponsored By Dell

  • White Papers // Aug 2013

    Protecting Exchange: Best practices and Practical Tips

    While disaster recovery and business continuity plans are necessary, they do not constitute a comprehensive and effective email data protection strategy. A good data-protection strategy must prevent the loss or corruption of mission-critical data. But the best data protection is really about minimizing downtime. According to a 2011 Forrester survey,...

    Sponsored By Dell

  • White Papers // Aug 2013

    Data Protection: Evaluating Business Requirements and Classifying Your Data

    Protecting your company’s data and applications means much more than just running a simple backup routine. It is about protecting your business assets throughout their lifecycle – in terms of preservation, recoverability and availability. A complete data-protection approach can help your company adapt to rapidly changing opportunities and environments, including:

    Sponsored By Dell

  • White Papers // Mar 2013

    Are Employees Putting Your Company's Data at Risk?

    This is a must read for any IT, risk or compliance professionals looking to getting a better handle on securing person-to-person file transfers within their business.

    In a growing number of organizations, sensitive data is being moved in and out of the business with little oversight. As employees turn...

    Sponsored By Ipswitch

  • White Papers // Oct 2012

    802.1X Explained

    BYOD (Bring your own Device) is the term we have tried to put in the furthest, darkest place in our mind. Why do we react this way? The answer is that change scares us. Today, we are going to embark on a journey through several areas of this technology. We...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

    CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper...

    Sponsored By Blue Coat Systems

  • White Papers // Feb 2011

    How to Defend Against DDoS Attacks and Strengthen Security Controls

    After WikiLeaks released classified U.S. documents, companies that provided WikiLeaks with access to funding were encouraged to or decided to stop. What followed was a well-organized revenge plot (orchestrated on behalf on WikiLeaks, but not by WikiLeaks) that helped WikiLeaks extend its stay in the news headlines and interrupted the...

    Sponsored By Global Knowledge

  • White Papers // Jan 2010

    Windows 7 and AppLocker

    AppLocker represents some significant improvements to Software Restriction Policies. The ability to use digital signature information, the ability to use greater-than and less-than operators for version numbers, letting administrators create rules based on group membership, and being able to autoscan a "standard" workstation to automatically generate rules for all certified...

    Sponsored By Global Knowledge

  • White Papers // Aug 2013

    Survey: Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Sponsored By Webroot Software

  • White Papers // Aug 2013

    Windows Azure™ Security Overview

    Windows Azure, as an application hosting platform, must provide confidentiality, integrity, and availability of customer data. It must also provide transparent accountability to allow customers and their agents to track administration of services, by themselves and by Microsoft. This document describes the array of controls implemented within Windows Azure, so...

    Sponsored By Microsoft

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Sponsored By Symantec

  • Podcasts // Sep 2013

    Step Up to the IT Security Challenge

    Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

    A deeper understanding of how to manage your IT...

    Sponsored By Kaspersky Lab

  • Videos // Aug 2013

    What is Adaptive Redaction? - Video

    Information management can become extremely complex and costly if not managed efficiently, but with effective Information Governance policy in place, you can stay ahead of the competition and uncover opportunities to drive business value. Adaptive Redaction is your assurance that critical information is kept safe. Learn more about Adaptive Redaction.

    Sponsored By Clearswift

  • White Papers // Aug 2013

    The Enemy Within: an emerging threat - Blog

    Read the blog announcement of the research report 'The Enemy Within', conducted to review the extent to which internal threats are affecting UK organisations.

    Sponsored By Clearswift

  • White Papers // Aug 2013

    The Enemy Within: an emerging threat - Infographic

    Research information from 300 IT decision makers in companies of various sizes in the UK across three key sectors: defence/aerospace, local government and finance/banking to identify the key security concerns and how they are being managed.

    Sponsored By Clearswift

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    You know two-factor authentication is critical for safeguarding your company’s critical information. But how do you know which solution is the best fit for your business?

    In this new technical brief, discover five things you must consider before purchasing a two-factor authentication solution. Then, learn about a powerful option...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Wild World of Malware: Keeping your Company Safe Inside

    While many types of malware have become familiar, new threats continue to evolve as hackers are forced to adapt. No longer just the foray of anti-social types trying to impress their peers or act out against authority, malware is now the business of organized, transnational gangs who are in it...

    Sponsored By Dell Software

  • White Papers // Sep 2013

    Data Loss Prevention: Providing Proactive Compliance Management

    Managing compliance and internal security polices can feel like a constant battle. IT organizations not only struggle with day-to-day operational efficiencies but also how to implement the internal controls over critical IT systems and people. In this new white paper, learn common industry regulations in America and abroad. Then, see...

    Sponsored By Dell Software

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • Downloads // May 2013

    Enhance IT Security with SolarWinds® Log & Event Manager

    What will you do when the security systems implemented to secure your IT environment are not secure anymore? Do you know what’s lurking in your network to exploit vulnerabilities and compromise IT security?

    SolarWinds Log & Event Manager (LEM) provides real-time insight and awareness into all your security, operational...

    Sponsored By SolarWinds

  • Downloads // Sep 2013

    Your Active Directory Problems are Much Bigger than You Think

    When diagnosing the cause of your Active Directory problems, native auditing won’t show you the complete picture of exactly what changed before your problems started. Netwrix Auditor Does what Native Auditing Can’t: