Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Dec 2012

    Windows Server 2012 and the Resilient File System (ReFS)

    Over the past 20 years, NTFS has become the de facto standard for a Microsoft enterprise file system. With the introduction of Windows Server 2012, Microsoft has released its latest file system, Resilient File Systems (ReFS), as a capable replacement to NTFS. Learn more about how ReFS brings new features...

    Sponsored By Global Knowledge

  • White Papers // Nov 2012

    Demonstrating proven business value through backup redesign

    Clal is an Israel-based financial services company with 5,000 employees, providing insurance, pension funds, provident funds, mutual funds and investments.

    Over the last 3 years, Clal’s data volume grew from around 63TB to 130TB, due to data generated from its direct employees and its 6,000 external insurance agents. With...

    Sponsored By EMC

  • White Papers // Nov 2012

    The Simplification of Corporate IT

    The traditional on-premise enterprise resource planning / management (ERP/M) model needs a radical rethink. This Workday paper explains how large organisations are moving to the cloud and benefitting from a SaaS model that offers enterprise-class security, predictable operating expenditures, rapid scaling and analysis tools that use a familiar web interface.

    Sponsored By Workday

  • White Papers // Oct 2012

    IP Version 6 Address Types

    In 1998, the Internet Engineering Task Force (IETF) released RFC 2460, outlining the technical specifications of IPv6, which addressed the shortcomings of the aging IPv4 protocol. As with any evolution of technology, new elements exist in the protocol that may seem strange and unfamiliar. This certainly includes address representation, space,...

    Sponsored By Global Knowledge

  • White Papers // Oct 2012

    Phishing: How to protect your business

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Sponsored By Symantec

  • White Papers // Oct 2012

    802.1X Explained

    BYOD (Bring your own Device) is the term we have tried to put in the furthest, darkest place in our mind. Why do we react this way? The answer is that change scares us. Today, we are going to embark on a journey through several areas of this technology. We...

    Sponsored By Global Knowledge

  • White Papers // Oct 2012

    ESG Whitepaper - Virtualization moves the SMB market forward

    The whitepaper talks about the pressures that SMB is facing --including small budgets, limited skill sets among IT staff, and limitations in their existing processes. But today, they have opportunities to break through perceived technology barriers to achieve greater business success. Technologies such as virtualization enable them to expand their...

    Sponsored By VMware

  • White Papers // Sep 2012

    Ten Steps to Better, Stronger Passwords

    Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are no longer considered a secure form of authentication. You should consider any static password that you can remember as...

    Sponsored By Global Knowledge

  • White Papers // Sep 2012

    Taneja Group: Overview of Virtualization and Cloud Market Vendor Landscape for SMBs

    Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users (companies with less than 1000 employees). This executive summary evaluates virtual infrastructure and management, end user computing, and cloud service provider solutions from leading vendors, to enable senior decision makers in...

    Sponsored By VMware

  • White Papers // Sep 2012

    Taneja Group Executive Summary: An overview of the Virtualization and Cloud Market Vendor Landscape for Small and Medium Businesses

    Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users (companies with less than 1000 employees). This executive summary evaluates virtual infrastructure and management, end user computing, and cloud service provider solutions from leading vendors, to enable senior decision makers in...

    Sponsored By VMware

  • White Papers // Jun 2012

    The Competitive Edge: Powerful Application Solutions for CRM and ERP

    Enabling midsize companies to realize their potential in this globally integrated economy, midsize businesses need to take advantage of emerging opportunities. IBM and its Business Partners understand your challenges and needs - we've created specific products and solutions designed to help growing companies like yours work more productively and profitably...

    Sponsored By IBM

  • White Papers // May 2012

    Engines of a Smarter Planet experience

    Midsize businesses are the thinkers and doers that are driving economic growth. IBM and its Business Partners are providing these businesses with insights, tools and affordable solutions to help them succeed.

    Sponsored By IBM

  • White Papers // May 2012

    Seven Security Myths of Windows 7

    Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do...

    Sponsored By Global Knowledge

  • White Papers // Mar 2012

    Mind the Gap: What is an ITIL® Gap Analysis?

    Organizations adopting ITIL best practices almost always ask, "Where do I begin?". The answer is a gap analysis. ITIL describes a gap analysis as a means of identifying areas where an organization falls short of its long-term vision. This white paper describes what a gap analysis is, what it entails,...

    Sponsored By Global Knowledge

  • White Papers // Feb 2012

    New Topics on Security SY0-301 from Domains 2.0-6.0

    The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated; the revamped exam focuses more on risk, operational security, and mobile device security. It also clearly emphasizes security in three main areas: application, data, and host. In preparing for SY0-301, it would be good to pay special attention to the...

    Sponsored By Global Knowledge

  • White Papers // Feb 2012

    Arguments Against Virtualization - And Why They Are Wrong

    There are many misconceptions about virtualization and its effect on applications and the existing infrastructure. Most of these misconceptions are the result of bad information, not enough information, or simply preconceived notions that are not founded in reality. This white paper separates fact from fiction on five of the big...

    Sponsored By Global Knowledge

  • White Papers // Nov 2011

    Hacking Back in Self-Defense: Is It legal? Should It Be?

    Hacking? Bots? The bottom-line is we are losing the war. Businesses must be able to defend themselves to prevent the loss of money, technology, and secrets. As new laws are explored, old ones amended, and solutions sought, let's think outside the box and give the good guys the advantage, or...

    Sponsored By Global Knowledge

  • White Papers // Oct 2011

    VMware vCenter Converter: Overview, P2V Tips, and Security Concerns

    vCenter Converter is becoming more robust and powerful with each new revision, and this white paper examines many common problems and possible solutions. Most systems can be virtualized, and the percentage is increasing with each new version of the Converter. As older, legacy systems are replaced with more agile applications,...

    Sponsored By Global Knowledge

  • White Papers // Oct 2011

    Ten New Topics on Security+ 2011 (SY0-301) (Domain 1.0: Network Security)

    The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated and covers 60 new topics not present in the previous version of the exam. The first topical domain: Network Security, is ever evolving and this paper addresses 10 important topics that you need to focus on as you prepare for...

    Sponsored By Global Knowledge

  • White Papers // Sep 2011

    Security Log Analysis: Saving the World, One Company at a Time

    Security logs are dangerous when they are not capturing data, or when the data is not being analyzed regularly and properly. Scouring your security logs, devouring the details, will make you and your organization stronger and there lies the opportunity.

    Sponsored By Global Knowledge

  • White Papers // Aug 2011

    Overlay Transport Virtualization: An Introduction

    Overlay transport virtualization (OTV) can address a lot of challenges presented in today's data center as far as moving components of the data center from one side to the other and making those sites layer 2 adjacent. It enables two data centers that are geographically dispersed to become layer 2...

    Sponsored By Global Knowledge

  • White Papers // May 2011

    SP1 for Windows 7 and Windows Server 2008 R2: What's New?

    This white paper examines the new features and updates in Service Pack 1 (SP1) for Windows 7 and SP1 for Windows Server 2008 R2, both of which were released on February 22, 2011. Although the two service packs are mostly independent of each other in updates and features, they do...

    Sponsored By Global Knowledge

  • White Papers // May 2011

    14 Security Policy Tips

    Every organization needs a security policy. If you already have one, then there are several important considerations you need to make in regards to your existing security strategy. If you have not yet designed your security policy, here are some important suggestions to integrate into your security stance. If you...

    Sponsored By Global Knowledge

  • White Papers // May 2011

    10 Essential Security Policies

    Every organization needs a corporate security policy to firmly establish guidelines that will keep the company's resources and knowledge safe. This white paper discusses ten such guidelines that should be included in every security policy. While certainly not a conclusive study of essential practices, these ten suggestions are a good...

    Sponsored By Global Knowledge

  • White Papers // Feb 2011

    How to Defend Against DDoS Attacks and Strengthen Security Controls

    After WikiLeaks released classified U.S. documents, companies that provided WikiLeaks with access to funding were encouraged to or decided to stop. What followed was a well-organized revenge plot (orchestrated on behalf on WikiLeaks, but not by WikiLeaks) that helped WikiLeaks extend its stay in the news headlines and interrupted the...

    Sponsored By Global Knowledge

  • White Papers // Oct 2010

    SharePoint 2010 Document Sets: Better Ways To Manage Content

    Content management is the process of managing information from a technology perspective. It encompasses all facets of data management to include the process of collecting and distributing information, regardless of the medium used. This white paper explains how document sets, which can make your life easier from the point of...

    Sponsored By Global Knowledge

  • White Papers // Jan 2010

    Windows 7 and AppLocker

    AppLocker represents some significant improvements to Software Restriction Policies. The ability to use digital signature information, the ability to use greater-than and less-than operators for version numbers, letting administrators create rules based on group membership, and being able to autoscan a "standard" workstation to automatically generate rules for all certified...

    Sponsored By Global Knowledge

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • White Papers // Oct 2013

    Smart Card Based Time Efficient Authentication Scheme for Global Grid Computing

    Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into...

    Provided By Karunya University

  • White Papers // Sep 2013

    Web Based Security System

    Security systems play an important role in the protection of lives and investment. In this paper, the authors are to design an efficient and cheap security system, which is accessible from any part of the world through the internet, and can be employed in every facet of the economy. This...

    Provided By University of Nicosia

  • White Papers // Sep 2013

    Ensuring High-Quality Randomness in Cryptographic Key Generation

    The security of any cryptosystem relies on the secrecy of the systems secret keys. Yet, recent experimental work demonstrates that tens of thousands of devices on the Internet use RSA and DSA secrets drawn from a small pool of candidate values. As a result, an adversary can derive the devices...

    Provided By Stanford Technology Ventures Program

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • White Papers // Sep 2013

    Faster Scans and Better Virus Detection - Can They Do That?

    This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today's more than 70 million malware variants. It also discusses how...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Managing Web Security in an Increasingly Challenging Threat Landscape

    This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with:

  • White Papers // Oct 2013

    Implementing a Security Analytics Architecture

    According to the 2012 Verizon Data Breach Investigations report, 99 percent of breaches led to data compromise within "days" or less, whereas 85 percent of breaches took "weeks" or more to discover. New security threats demand a new approach to security management.

    Read how the RSA approach to security...

    Sponsored By EMC

  • White Papers // Jun 2013

    IDC Technology Spotlight Delivering Endpoint Integration and Control

    Organizations are struggling to keep pace with a constantly evolving threat landscape, while also keeping a firm grip on an ever-expanding array of devices, software, applications, hardware and user profiles.

    This Technology Spotlight explores the benefits that integrated endpoint security platforms with centralized management control offer organizations. This paper...

    Sponsored By Kaspersky Lab

  • White Papers // Oct 2013

    IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks, such as:

      ...

      Sponsored By Kaspersky Lab

    • White Papers // Jun 2013

      Build Your IT Security Business Case

      The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security.

      In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments...

      Sponsored By Kaspersky Lab

    • White Papers // Jun 2013

      Your Data Under Siege: Guard the Gaps with Patch Management

      Are you guarding the cybersecurity gaps with patch management?

      How often do your employees select "install" when they get a notification pop-up message and how often do they choose the "later" option? According to Kaspersky Lab research, more than 70 percent of users of the most vulnerable programs (Adobe...

      Sponsored By Kaspersky Lab

    • White Papers // Jun 2013

      Your Data Under Siege: Defend It with Encryption

      Is your cyber security doing enough to protect your new, hyper-mobile business practices?

      Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming...

      Sponsored By Kaspersky Lab

    • White Papers // Jun 2013

      Your Data under Siege: Defeating the Enemy of Complexity

      Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

      Download Kaspersky Lab’s new whitepaper,...

      Sponsored By Kaspersky Lab

    • White Papers // Jun 2012

      The Competitive Edge: Powerful Application Solutions for CRM and ERP

      Enabling midsize companies to realize their potential in this globally integrated economy, midsize businesses need to take advantage of emerging opportunities. IBM and its Business Partners understand your challenges and needs - we've created specific products and solutions designed to help growing companies like yours work more productively and profitably...

      Sponsored By IBM

    • White Papers // Mar 2013

      Simple, cost-effective messaging and collaboration for medium-sized businesses

      Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is designed to provide simplified solutions and delivery models based on your needs.

      Sponsored By IBM

    • White Papers // Feb 2013

      Application security and risk management

      To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor the state of application security over time.

      The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to...

      Sponsored By IBM

    • White Papers // Feb 2013

      Integrating Security into Development, No Pain Required

      In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

      Sponsored By IBM

    • White Papers // Feb 2013

      How web application vulnerability assessment tools can improve enterprise security

      This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.

      Sponsored By IBM

    • White Papers // Jul 2013

      Gartner 2013 Magic Quadrant for Application Security Testing

      Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

      Sponsored By IBM

    • White Papers // Aug 2013

      Enterprise Information Security in Transition: An Opportunity for IBM

      Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

      Sponsored By IBM

    • White Papers // Feb 2013

      How Web Application Vulnerability Assessment Tools Can Improve Enterprise Security Profiles

      Web-based systems can compromise the overall security of an organization by introducing vulnerabilities that hackers can use to gain access to confidential company information. In addition, the growth in mobile computing greatly expands the attack surface for hackers. Unfortunately, in the race to stay one step ahead of the competition,...

      Sponsored By IBM

    • White Papers // Feb 2013

      Safeguarding the cloud with IBM Security solutions

      Maintain visibility and control with proven security solutions for public, private and hybrid clouds

      Sponsored By IBM

    • White Papers // Aug 2013

      Leverage Security Intelligence for Energy and Utilities Companies

      In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

      Sponsored By IBM

    • White Papers // Feb 2013

      Delivering Success that Scales with the Largest Enterprises

      IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar ® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information...

      Sponsored By IBM

    • White Papers // Aug 2013

      Boosting Enterpise Security with Integrated Log Management

      This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

      Sponsored By IBM

    • White Papers // Jul 2013

      Emerging Security Trends and Risks. Insights for the Security Executive

      For the busy executive, security is not an issue that can simply be delegated; it must be embraced as another important component of any plan for doing business in an increasingly complex and technology-driven world.

      Sponsored By IBM

    • White Papers // Feb 2013

      Finding a strategic voice. Insights from the 2012 IBM Chief Information Security Officer Assessment

      Reflecting on recent security breach news, some security leaders are attempting to move towards a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater...

      Sponsored By IBM

    • White Papers // Oct 2013

      EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar

      This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach.

      Download this analyst report to discover how...

      Sponsored By IBM

    • White Papers // Feb 2013

      Managing Threat in a Digital Age

      Recent media attention has highlighted the proliferation of security breaches affecting enterprises across numerous industries. These security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. No longer relegated to the domain of the IT organization, the topic...

      Sponsored By IBM

    • White Papers // Oct 2013

      The Evolution and Value of Purpose-Built Backup Appliances

      This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

      Sponsored By Symantec

    • White Papers // Oct 2013

      Symantec Internet Security Threat Report

      Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

      Sponsored By Symantec

    • White Papers // Sep 2013

      Phishing: No. 1 web threat and how web security can protect your company

      This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products.

      Learn...

      Sponsored By Webroot Software

    • White Papers // Oct 2013

      Significant Hidden Threats to Your Enterprise Security

      Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry. Most organizations have no process for managing, removing, and changing access-granting keys. This white paper focuses on SSH user key remediation as a process which...

      Sponsored By ssh

    • White Papers // Aug 2013

      5 Tips to Choosing the Right Business Phone System

      IP phone and unified communications solutions have evolved to allow businesses to leverage powerful applications and technologies in an effort to improve productivity and boost success.

      Organizations large and small have a wide array of phone systems to choose from, and business-decision makers need to consider numerous factors when...

      Sponsored By ShoreTel

    • White Papers // Aug 2013

      SANS Survey on Mobility/BYOD Security Policies and Practices

      In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet, 38% do not have the policies they feel are necessary.

      Learn why you need to implement stronger...

      Provided By McAfee

    • White Papers // Apr 2012

      ESG Security Management Maturity Model

      The Enterprise Strategy Group has been actively following the information security market since 2003. During this timeframe, ESG has undertaken numerous surveys involving thousands of enterprise security professionals and conducted hundreds of interviews with CISOs and other senior security executives. Over the past few years, ESG has noticed change in...

      Provided By EMC Corporation

    • White Papers // Aug 2013

      Freeform Dynamics Report - The End User Security Jigsaw

      Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts. A global study of 977 IT and business professionals provided...

      Provided By McAfee

    • White Papers // Jan 2013

      A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals

      Recently, Malware have been created in order to commit a theft user's permission via C&C botnet and stopover server. It makes information leakage by arbitrarily modifying or creation of system files. It defines the limitation of conventional pattern matching and signature detection of vaccine. Digital forensics techniques that have been...

      Provided By Korea University

    • White Papers // Sep 2012

      BYOD is Here to Stay, But Organizations Must Adapt: Free Whitepaper Download

      Mobile device adoption has given rise to the escalating BYOD trend and shows no signs of slowing. As more and more employees bring their personal laptops, iPads and Android devices to the workplace, IT teams are dealing with new security, compliance, support, management and cost challenges associated with BYOD. HTML5...

      Provided By Ericom Software

    • White Papers // Mar 2013

      Secure Web Gateways Buyer's Guide

      The web is the number one source for malware distribution. With more than 2 million new pages added every day and 10,000 new malicious Web sites found on a daily basis, how do you keep up with the volume, not to mention the increasing sophistication of all these web-based threats?...

      Provided By Blue Coat Systems

    • White Papers // Aug 2013

      WEBCAST: Choosing the Right Tools for SharePoint 2013 Management

      Organisations are finding compelling reasons to adopt or upgrade to SharePoint 2013. The platform includes a variety of new and enhanced functionality for end users, but many organisations are still unsure how to manage the new platform. In this webcast, we'll explore several tools that make SharePoint 2013 management easier...

      Provided By Dell Software

    • White Papers // Dec 2011

      Deploying Secure Multi-Party Computation for Financial Data Analysis

      In this paper, the authors describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, they use secret sharing and secure Multi-Party Computation (MPC) techniques. While MPC has been used to solve real-life problems beforehand, this is the...

      Provided By University of Tartu

    • White Papers // Jan 2006

      Encryption Key Management, Key Rotation and the PCI Data Security Standard

      Enterprise Information Protection The Payment Card Industry Data Security Standards are a multi-faceted approach to the protection of cardholder data. The credit card associations Visa, Mastercard, American Express and Discover aligned their individual policy protection programs to create the Payment Card Industry Data Security Standard (PCI DSS). This alignment in...

      Provided By Vormetric

    • White Papers // Aug 2013

      5 Steps to Protect your Business from being a Cybercrime Statistic (Large Infographic)

      Did you know that last year as many as 75% of recent data breaches targeted small and medium sized businesses? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it. Download this...

      Provided By McAfee

    • White Papers // Aug 2013

      McAfee Cloud-Based Security for SMBs

      Cybercriminals are targeting growing businesses like yours. They’re zeroing in, believing that your business is an easier target because you can’t afford a sophisticated security framework. However, there’s an answer to this dilemma-- cloud-based solutions that deliver the most effective, up-to-date security that are both scalable and...

      Provided By McAfee

    • White Papers // Aug 2013

      How to Protect your business from Hackers

      Gone are the days when hackers were mostly harmless recreational programmers. The malicious intent of today’s cyber criminals is only exceeded by their zeal to profit from their electronic crimes. In this Solution Brief, McAfee discusses why small and mid-sized businesses are especially vulnerable due to lower security defences and...

      Provided By McAfee