Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Jun 2013

    Your Data under Siege: Defeating the Enemy of Complexity

    Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

    Download Kaspersky Lab’s new whitepaper,...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Protection for Every Enterprise: How BlackBerry 10 Security Works

    If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list of requirements. And if you’re in IT, you don't just want the highlights – you need the details. This document provides an IT-level breakdown of BlackBerry® 10 Security, explaining how it...

    Sponsored By BlackBerry

  • Webcasts // Jun 2013

    BlackBerry 10 Security - What IT Needs To Know

    Discover how BlackBerry® Security covers the full range of security needs cross-platform, with data leakage protection, certified encryption, BlackBerry® Balance™ and containerization. Plus, find out about our security roadmap and our advanced security services for the locked-down needs of government and regulated industries.

    Sponsored By BlackBerry

  • Downloads // May 2013

    Enhance IT Security with SolarWinds® Log & Event Manager

    What will you do when the security systems implemented to secure your IT environment are not secure anymore? Do you know what’s lurking in your network to exploit vulnerabilities and compromise IT security?

    SolarWinds Log & Event Manager (LEM) provides real-time insight and awareness into all your security, operational...

    Sponsored By SolarWinds

  • White Papers // May 2013

    How to unleash the value of your scanned documents

    Have your scanned documents become a digital landfill? Is an unmanaged assortment of files threatening to become an avalanche in your office? This ebook provides insight into how to get control of your digital assets and increase your office's productivity without embarking on a complex, disruptive or expensive project. Detailing...

    Sponsored By VirtualWorks

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    You know two-factor authentication is critical for safeguarding your company’s critical information. But how do you know which solution is the best fit for your business?

    In this new technical brief, discover five things you must consider before purchasing a two-factor authentication solution. Then, learn about a powerful option...

    Sponsored By Dell Software

  • White Papers // Apr 2013

    Three Ways to Improve Your Data Storage Capabilities

    Every company is interested in capturing, analyzing and taking action on data. Unfortunately, many data solutions and partners promise the world but offer very little. Whether you're thinking of switching to the cloud, or trying to reduce costs, or you're just searching for a scalable solution, understanding the best ways...

    Sponsored By EMC

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer.

    Learn why SSO for...

    Sponsored By Centrify

  • White Papers // Mar 2013

    Simple, cost-effective messaging and collaboration for medium-sized businesses

    Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is designed to provide simplified solutions and delivery models based on your needs.

    Sponsored By IBM

  • White Papers // Mar 2013

    Password Change Service - Avaya CallPilot

    Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator how to set up and utilize Password Reset Service, introduced with CallPilot Release 5. This feature is not unlike...

    Sponsored By Global Knowledge

  • White Papers // Mar 2013

    Legal Issues of Cloud Forensics

    Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. If they need to collect information from the cloud to determine what happened, to determine what was lost or compromised, for remediation, for civil litigation, or for...

    Sponsored By Global Knowledge

  • White Papers // Mar 2013

    Are Employees Putting Your Company's Data at Risk?

    This is a must read for any IT, risk or compliance professionals looking to getting a better handle on securing person-to-person file transfers within their business.

    In a growing number of organizations, sensitive data is being moved in and out of the business with little oversight. As employees turn...

    Sponsored By Ipswitch

  • Podcasts // Mar 2013

    Time Tracking Product Preview

    With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.

    Sponsored By Workday

  • White Papers // Mar 2013

    Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Center: EMC Best Practices in Data Protection Monitoring

    Regardless of whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. It should not come as a surprise that, according to ESG's 2013 IT Spending Intentions Survey, improving data backup and recovery was the...

    Sponsored By EMC

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Sponsored By IBM

  • Webcasts // Feb 2013

    IPS: Evolving to Remain Relevant

    With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker John Grady, Research Manager, Security Products and Services at IDC and Paul Kaspian, Senior Product Marketing Manager for IBM Security Systems to find out...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Managing Access Security in a Multi-Perimeter World

    Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new integrated approach for securing the wide variety of enterprise and web resources from any device, any service and any source. Join IBM and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing identities and access in the cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Intelligent role management for improved security and compliance

    In complex organizations with sprawling role structures, managing user access and entitlements can be overwhelming. As part of an effective strategy for identity and access management governance, role management is a powerful method with which to strengthen and streamline the management process. Although role management solutions may help, many are...

    Sponsored By IBM

  • Presentations // Feb 2013

    IBM Identity and Access Management

    This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data and processes, while enhancing business productivity.

    Sponsored By IBM

  • White Papers // Feb 2013

    Secure By Design: Building Identity-based Security into Today’s Information Systems

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.

    Sponsored By IBM

  • White Papers // Feb 2013

    Consolidated security management for mainframe clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

    Sponsored By IBM

  • Webcasts // Feb 2013

    Mitigating Insider Threats

    IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automates, and tracks use of privileged account access. The solution helps protect clients at their most vulnerable points, from the people who have legitimate access and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Identity and Access Intelligence: Transforming Enterprise Security

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events...

    Sponsored By IBM

  • White Papers // Feb 2013

    Application security and risk management

    To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor the state of application security over time.

    The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to...

    Sponsored By IBM

  • White Papers // Feb 2013

    Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

    Sponsored By IBM

  • White Papers // Feb 2013

    How web application vulnerability assessment tools can improve enterprise security

    This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.

    Sponsored By IBM

  • White Papers // Feb 2013

    How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security Profiles

    Web-based systems can compromise the overall security of an organization by introducing vulnerabilities that hackers can use to gain access to confidential company information. In addition, the growth in mobile computing greatly expands the attack surface for hackers. Unfortunately, in the race to stay one step ahead of the competition,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Safeguarding the cloud with IBM Security solutions

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere BigInsights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time correlation...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar ® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information...

    Sponsored By IBM

  • White Papers // Feb 2013

    Finding a strategic voice. Insights from the 2012 IBM Chief Information Security Officer Assessment

    Reflecting on recent security breach news, some security leaders are attempting to move towards a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater...

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing Threat in a Digital Age

    Recent media attention has highlighted the proliferation of security breaches affecting enterprises across numerous industries. These security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. No longer relegated to the domain of the IT organization, the topic...

    Sponsored By IBM

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Sponsored By Symantec

  • White Papers // Jan 2013

    Top Ten Cybersecurity Risks: How Prepared Are you for 2013?

    Rather than looking back over the past year, organizations and individuals need to start assessing cyber security threats that lie ahead in the New Year. While there is always the chance for a new threat or risk to be unearthed this year, often the risks of the New Year are...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Demystifying Switch-based ACLs

    Access Control Lists (ACLs) are a common staple of Cisco networking, traffic control, and security topics. Access-list configuration and deployment on routers is familiar to most network professionals, but the unique nuances of these same constructs on switches may be much less familiar. This white paper explores switch-based access-lists, explains...

    Sponsored By Global Knowledge

  • White Papers // Jan 2013

    Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

    CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper...

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2013

    Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach

    Information security best practices are all about mitigating risks. There is no 100 percent fail-safe security program, device or system. It takes an orchestrated effort between managed security services, threat intelligence and incident response to provide the strongest defense. This paper presents the advantages of a single-outsourced solution for managed...

    Sponsored By Dell

  • White Papers // Sep 2013

    Why the Growth is moving from In-House to Managed Services

    Small and medium businesses are moving away from managing their network security in-house in favor of outsourcing it to managed security services providers. In fact, Aberdeen's 1Q2013 study of nearly 200 organizations found that more than half of all respondents have outsourced at least one of their IT Security solutions,...

    Sponsored By Dell

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • Webcasts // Feb 2013

    IPS: Evolving to Remain Relevant

    With constantly changing threats, a shifting network perimeter, and increasingly sophisticated attackers, organizations must adapt both their processes and technologies to keep up. Join guest speaker John Grady, Research Manager, Security Products and Services at IDC and Paul Kaspian, Senior Product Marketing Manager for IBM Security Systems to find out...

    Sponsored By IBM

  • Podcasts // Mar 2013

    Time Tracking Product Preview

    With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.

    Sponsored By Workday

  • Webcasts // Feb 2013

    Managing Access Security in a Multi-Perimeter World

    Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new integrated approach for securing the wide variety of enterprise and web resources from any device, any service and any source. Join IBM and...

    Sponsored By IBM

  • Presentations // Feb 2013

    IBM Identity and Access Management

    This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data and processes, while enhancing business productivity.

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing identities and access in the cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Feb 2013

    Secure By Design: Building Identity-based Security into Today’s Information Systems

    In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) analysts examine today’s security challenges in light of the opportunity to build security directly into information systems, and the role of today’s finely grained technologies for identity and access management that make this more proactive approach possible.

    Sponsored By IBM

  • White Papers // Feb 2013

    Consolidated security management for mainframe clouds

    IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure™ Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events...

    Sponsored By IBM

  • White Papers // May 2013

    How to unleash the value of your scanned documents

    Have your scanned documents become a digital landfill? Is an unmanaged assortment of files threatening to become an avalanche in your office? This ebook provides insight into how to get control of your digital assets and increase your office's productivity without embarking on a complex, disruptive or expensive project. Detailing...

    Sponsored By VirtualWorks

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer.

    Learn why SSO for...

    Sponsored By Centrify

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Sponsored By Centrify

  • White Papers // May 2012

    Engines of a Smarter Planet experience

    Midsize businesses are the thinkers and doers that are driving economic growth. IBM and its Business Partners are providing these businesses with insights, tools and affordable solutions to help them succeed.

    Sponsored By IBM

  • White Papers // Sep 2013

    The Importance of DMARC

    Keeping your customers safe goes hand in hand with keeping them happy. For instance, customers are 42% less likely to do business with a company that has undergone a phishing attack. Learn how you can implement DMARC for your email program and keep you and your customers safe.

    Sponsored By Dyn

  • White Papers // Sep 2013

    Building Your Sender Reputation In Four Steps

    Having trouble reaching your customers’ inboxes? You might have a poor sender reputation. Similar to a credit score, sender reputations reflect how good or bad your sending habits are If your reputation is lower than you’d like just follow these 4 easy steps to start hitting the inbox.

    Sponsored By Dyn

  • White Papers // Sep 2013

    Whitepaper: DDoS Defense for Financial Services Companies

    Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but...

    Sponsored By Arbor Networks

  • White Papers // Sep 2013

    Whitepaper: How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

    In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more...

    Sponsored By Arbor Networks

  • White Papers // Sep 2013

    Whitepaper: The Business Value of DDoS Protection

    Today's hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations - provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a...

    Sponsored By Arbor Networks

  • White Papers // Sep 2013

    Three questions every CISO should ask himself about vulnerabilities

    Are you leaving your company exposed? Do you know how your team prioritizes vulnerabilities today and whether they are in fact dealing with the critical ones first? Ensuring that software vulnerabilities, and in particular the critical ones, are being handled should be at the top of the CISO agenda -...

    Sponsored By Secunia

  • White Papers // Sep 2013

    Intro: Secunia Vulnerability Intelligence Manager (VIM) 4.0

    The Secunia VIM 4.0 is a powerful Vulnerability Intelligence and Management tool that provides you with the necessary information to analyze vulnerabilities in your IT infrastructure, enabling you to track and eliminate them easily from a centralized dashboard interface. Read on to find out how Secunia can help your business...

    Sponsored By Secunia

  • White Papers // Nov 2012

    Demonstrating proven business value through backup redesign

    Clal is an Israel-based financial services company with 5,000 employees, providing insurance, pension funds, provident funds, mutual funds and investments.

    Over the last 3 years, Clal’s data volume grew from around 63TB to 130TB, due to data generated from its direct employees and its 6,000 external insurance agents. With...

    Sponsored By EMC

  • White Papers // Sep 2013

    The cyber threat facing the Financial Sector and all of us

    Cybercrime is the second most commonly reported economic crime in the Financial Services sector, accounting for 38% of incidents. Unfortunately this is a trend that is predicted to continue on an upward trajectory.

    Your financial institution is only one vulnerability away from being compromised. If you were ever in any...

    Sponsored By Secunia

  • White Papers // Sep 2013

    How to Secure a Moving Target with Limited Resources

    It is estimated that 34.3% of the Earth's population has access to the Internet. The fact that the majority of organizations have highly confidential data in the cloud, not to mention that all manner of financial and personal information is being shared online; means that there is an almost endless...

    Sponsored By Secunia

  • White Papers // Sep 2013

    Tucson Electric Power Commissions Secunia's Vulnerability Intelligence Manager for NERC Compliance

    As part of their commitment to deliver safe, reliable energy services, Tucson Electric Power recognized the need to upgrade their security systems and fulfill North American Electric Reliability Corporation (NERC) compliance standards, including Critical Infrastructure Protection (CIP) requirements.

    To manage everyday operations, IT Security relied on many information sources...

    Sponsored By Secunia

  • Podcasts // Oct 2013

    Managers Know More with Oracle Sales Cloud

    Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.

    Sponsored By Oracle

  • Webcasts // Jun 2013

    Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10

    For many organizations, creating a secure, auditable, archived and compliant Enterprise Mobile Management (EMM) solution is a must. This webcast will explore the options available with BlackBerry® Enterprise Service 10, including the newly introduced ‘Enterprise Mobile Management – Regulated’ option and third-party tools for security mobile auditing, archiving and forensics....

    Sponsored By BlackBerry

  • White Papers // Jun 2013

    Protection for Every Enterprise: How BlackBerry 10 Security Works

    If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list of requirements. And if you’re in IT, you don't just want the highlights – you need the details. This document provides an IT-level breakdown of BlackBerry® 10 Security, explaining how it...

    Sponsored By BlackBerry

  • Webcasts // Jun 2013

    BlackBerry 10 Security - What IT Needs To Know

    Discover how BlackBerry® Security covers the full range of security needs cross-platform, with data leakage protection, certified encryption, BlackBerry® Balance™ and containerization. Plus, find out about our security roadmap and our advanced security services for the locked-down needs of government and regulated industries.

    Sponsored By BlackBerry

  • Webcasts // Jun 2013

    BlackBerry Security Response - Protecting Your Deployments

    Wondering exactly how BlackBerry® protects against and responds to security threats? Join this webcast to hear about trends that are contributing to increases in mobile malware and data leakage risks for enterprises. Then, find out how security response is a key part of the BlackBerry approach to enterprise mobility management.

    Sponsored By BlackBerry

  • White Papers // Sep 2013

    How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

    Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need...

    Sponsored By Arbor Networks

  • White Papers // Sep 2013

    DDoS Defense for Financial Services Companies

    Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but...

    Sponsored By Arbor Networks

  • White Papers // Oct 2013

    The Big Data Security Analytics Era Is Here

    Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means...

    Sponsored By EMC

  • White Papers // Oct 2013

    EMC 15-minute guide to continuous availability

    Everyone in business today expects to be able to access applications and data whenever and wherever they need to. Users and customers have less tolerance for downtimes, planned or unplanned.

    Continuous availability can tackle these challenges and this paper explores this in more depth and how it can be...

    Sponsored By EMC

  • Videos // Oct 2013

    RSA Security Analytics Demo

    See how RSA Security Analytics helps security analysts detect and investigate threats often missed by other security tools to cut attacker free time from weeks to hours. This video will guide you through the investigation of a mock security attack.

    Sponsored By EMC