Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Jul 2014

    Getting Started: With a Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate...

    Sponsored By Palo Alto Networks

  • White Papers // Mar 2014

    5 Essentials for Protecting Against Advanced Persistent Threats (APTS)

    Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies. This paper clarifies the nature of APT risks and provides recommendations on how organizations can better protect themselves. Read more...

    Sponsored By Websense

  • White Papers // Mar 2014

    Protecting IP Data from Loss and Theft

    This white paper describes the shortest path to reaching the prevention stage of data loss and data theft incidents without bringing data flows to a grinding halt. The paper presents an expanded view of IP and outlines six steps an organization can take to deploy data security controls. Read more...

    Sponsored By Websense

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • White Papers // Jul 2014

    Top 5 Things Every Developer Should Know

    C sharp has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects

    Sponsored By Coverity

  • White Papers // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

    Sponsored By Imperva

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • White Papers // Feb 2013

    Virtualizing disaster recovery using cloud computing

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • White Papers // Jul 2014

    Total Cost of Ownership Analysis of a Traditional Data Centre vs. a Scalable - Download Now

    Standardised, scalable, pre-assembled, and integrated data centre facility power and cooling modules provide a “total cost of ownership” (TCO) savings of 30% compared to traditional, built-out data centre power and cooling infrastructure. Avoiding overbuilt capacity and scaling the design over time contributes to a significant percentage of the overall savings....

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Whitepaper: Datacom cloud email archiving

    Automatically, affordably and securely store messages to have instant access to critical emails when you need them.Find out more about email archiving in this informative whitepaper.

    Sponsored By EMC

  • White Papers // Jul 2014

    The Big Data Zoo—Taming the Beasts

    With so much talk about big data and the possibilities it can offer, the truth behind what big data is—and what it can do for businesses—can be hard to determine. However, according to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk is not hard to see,...

    Sponsored By IBM

  • White Papers // May 2013

    Develop an intelligent disaster recovery solution with cloud technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • Case Studies // Feb 2014

    2013 Gartner Magic Quadrant for Security Intelligence & Event Management (SIEM)

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • Case Studies // Feb 2014

    Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Jul 2014

    Stepping Into the Cloud:  A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    There’s no such thing as “the cloud,” says this Frost & Sullivan executive brief. It’s more useful to think of the cloud as shorthand for a range of service and deployment models. This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with...

    Sponsored By IBM

  • White Papers // Jul 2014

    Gartner Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jun 2014

    7 essentials whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // Jun 2014

    Building the business case for continuity and resiliency

    Now available: the cost data you need to build the business case for improved continuity and resiliency. Based on findings from the largest study of its kind—the IBM Global Study on the Economic Impact of IT Risk—which surveyed 2,136 IT professionals around the world, 1,069 of them business continuity professionals....

    Sponsored By IBM

  • White Papers // Jun 2014

    Cloud-based data backup: a buyer's guide

    Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud...

    Sponsored By IBM

  • White Papers // Jun 2014

    IBM MobileFirst Managed Mobility Services service profile

    Now you can cut through the complexity by using Managed Mobility Services as the framework for your mobility efforts, creating new levels of productivity for employees and transforming your business processes. Read the service profile to learn how IBM MobileFirst can help you create a security-rich, flexible technology environment that...

    Sponsored By IBM

  • White Papers // Jun 2014

    The case for cloud-based data backup - IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

    Using tape may be appropriate for long-term data storage, but many IT executives find it too expensive, inefficient and unreliable for day-to-day data backup. It is also typically not suitable for backing up data stored on virtualized servers. Learn how IBM SmartCloud Managed Backup cloud services can lower costs while...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The economics of IT risk and reputation: What business continuity and IT security really mean to your organization

    For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The Reputational Impact of IT Risk with Forbes Insight

    This report from Forbes Insights provides valuable information on howSecurity and resilience affect nearly every aspect of your company, including your brand value and reputation.

    Sponsored By IBM

  • White Papers // Jun 2014

    The seven essential practices for effective business continuity management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Sponsored By IBM

  • Presentations // Jun 2014

    Tipping point presentation

    Cloud resilience has come of age and the benefits to the IT organization may be obvious. Understand how it may be time for your organization to jump on cloud too. This presentation helps you to make the case for cloud and achieve a higher level of business resilience.

    Sponsored By IBM

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • White Papers // Jun 2014

    Follow the money, Follow the crime

    A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Cost of Data Breach Study, From Ponemon Institute, sponsored by IBM

    IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Global Cost of Data Breach Study

    How much can a data breach cost? And are you doing enough to prevent it from happening to you? The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations. Read this critical research to...

    Sponsored By IBM