Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Feb 2015

    IBM Security Identity Governance and Administration

    IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

    Sponsored By IBM

  • White Papers // Feb 2015

    See Clearly in the Cloud with Threat-Aware Identity and Access Management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Sponsored By IBM

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Infographic - Roadmap to Content Mobility: 5 Steps to Keeping your Data Safe

    Data security is getting more complicated. Compliance is touching more and more data and too much data is stored solely on user devices. You need data in the right place at the right time, with the visibility and control to ensure that it’s handled appropriately. Your path to secure...

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    Protecting Your APIs against Attack and Hijack

    The pressure is on to securely connect the enterprise to mobile apps, cloud platforms and developer networks through APIs. But it is a mistake to think you can secure APIs using the same methods and technology as before. APIs have an entirely unique risk profile that must be addressed....

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    A How-to Guide to OAuth & API Security

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Five Simple Strategies for Securing APIs

    APIs might represent increased risk for the enterprise, but the potential benefits they bring to an organisation can overshadow any inherent dangers. Read this eBook to understand the 3 attack vectors or watch with APIs, and 5 simple strategies to secure your APIs.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Choosing the Right API Management Solution for the Enterprise User

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Sponsored By CA Technologies

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Top 5 Reasons Why Cloud Security Beats Traditional Security

    Not long ago, security was viewed as one of the biggest obstacles to widespread adoption of cloud-based deployments for enterprise software solutions. With recent developments and cloud vendors living exclusively in the cloud world, they have managed to build a much higher level of data center and virtual system security...

    Sponsored By Infor

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Meeting Payment Card Industry Data Security Standard 3.0 Requirements

    Merchants, large and small, face the high risk of data breaches arising from inadequate security controls that leak or allow access to sensitive cardholder data. The Payment Card Industry Data Security Standard was developed with the intent of reducing the risk of handling cardholder data by creating compliant Cardholder Data...

    Sponsored By Vormetric

  • White Papers // Jan 2015

    Vormetric Tokenization with Dynamic Data Masking - PCI DSS 3.0

    For too many IT organizations, complying with the Payment Card Industry Data Security Standard (PCI DSS) and corporate security policies has been far too costly, complex, and time consuming. Now, Vormetric offers a better way - Vormetric Tokenization with Dynamic Data Masking helps your security team address its compliance objectives...

    Sponsored By Vormetric

  • White Papers // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Sponsored By IBM

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Forrester - Engage Audit Professionals for Better Security Assessment Outcomes

    Read this report from Forrester Research to learn how to take advantage of your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program.

    Sponsored By IBM

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Sponsored By Symantec

  • White Papers // Jan 2015

    2014 Cost of Cyber Crime Study: Australia

    The incidence and cost of cyber crime in Australia is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Cost of Cyber Crime study for Australia...

    Sponsored By HP

  • White Papers // Jan 2015

    Improve your Security in 30 days with HP TippingPoint

    This white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days. It offers a day-by-day approach that helps you understand what a Network-Generation Intrusion Prevention System ( NGIPS) can do and includes links to background information to help you better understand the...

    Sponsored By HP

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • White Papers // Jan 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // Jan 2015

    Gartner Report: Magic Quadrant for Managed Mobility Services

    Of the 14 top managed mobility services providers Gartner examined and reviewed by both completeness of vision and ability to execute, only IBM was positioned in the Leaders Quadrant in their latest Magic Quadrant report. Read the analyst report to learn more. We continue to address the growing needs of...

    Sponsored By IBM

  • White Papers // Jan 2015

    New age security threats require new age solutions. Fixing security requires a fresh approach.

    Current endpoint software security software is resource heavy and therefore slow. With the growing number of exploits and mobile attacks available to modern cybercriminals, real-time, actionable threat intelligence within a global context is more important than ever for securing organizations. Find out how to face these challenges in this information...

    Sponsored By Webroot

  • White Papers // Jan 2015

    A Smarter Solution to Malware Prevention

    This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.

    Sponsored By Webroot

  • White Papers // Jan 2015

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • White Papers // Jan 2015

    TechInsights Report: Enterprise Mobility- It’s All About the Apps

    It’s time for IT to turn the tables. Instead of having end users smuggle in the apps they want to use despite what IT supports, IT can become the originator of creative, functional, enterprise-ready mobile apps for internal and external customers. IT is the source, not simply the supporter or...

    Sponsored By CA Technologies

  • White Papers // Jan 2015

    Security eBook : Five Simple Strategies for Securing API

    This eBooklet provides an overview of the new risks, and offers five simple solutions to counter the common threats and explores the benefits of agile integration. Find out more-and gain new insights-by reading our report.

    Sponsored By CA Technologies

  • White Papers // Jan 2015

    Research – Mobility: Why Customers Aren’t Satisfied and What to Do About It

    This latest research indicates that enterprise mobility adopters have seen a 51% improvement in overall customer experience. Learn more about the current state of mobility and how enterprises are responding and succeeding with an enterprise-wide approach to mobility.

    Sponsored By CA Technologies

  • White Papers // Jan 2015

    3 Philosophies for the IoT Age

    This eBook uses the ideas of three great thinkers to provide an overview of the business opportunities and technical challenges of IoT.

    Sponsored By CA Technologies

  • White Papers // Jan 2015

    Is your platform secure? Really?

    The introduction of the cloud architecture, with its virtualizati on basis, has created new avenues of attack. The challenge of protecting the organizational assets and process, while avoiding adverse impact on service levels, is growing. Although many organizations view security as a simplistic access to assets, the Solitaire Interglobal Ltd....

    Sponsored By IBM

  • White Papers // Jan 2015

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By Solarwinds APAC

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Sponsored By Proofpoint

  • Research // Dec 2014

    Gartner Magic Quadrant for Secure Email Gateways, 2014

    Whether you’re looking to stop advanced inbound email threats from entering your organization, or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email - you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint

  • White Papers // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

    Sponsored By Proofpoint