Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Jun 2014

    Encryption, Key Management, and Consolidation in Today’s Data Center

    In the midst of an ever-changing, ever-more dangerous threat landscape, insiders continue to inflict damage, and in virtualized and cloud environments, more privileged users can gain access sensitive data. In addition, external attacks and attackers are increasingly sophisticated in this evolving environment; data protection strategies become increasingly critical, and ever...

    Provided By SafeNet

  • White Papers // Jun 2014

    Data Center Encryption Survey

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Provided By SafeNet

  • White Papers // Jun 2014

    Whitepaper: Datacom cloud email archiving

    Automatically, affordably and securely store messages to have instant access to critical emails when you need them.Find out more about email archiving in this informative whitepaper.

    Provided By EMC

  • White Papers // Jul 2014

    Getting Started With a Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate...

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    10 Things Your Next Firewall Must Do eBook

    Effectively stopping advanced threats requires a new approach to security. Find out the 10 must-haves for security products today. Download your booklet now! In this free booklet, you'll find insightful and practical advices on: The why and how of next-generation security 10 critical functions your network...

    Provided By Palo Alto Networks

  • White Papers // Jul 2014

    HP HAVEn: See the Big Picture in Big Data -- Pinpoint Security Risks with 100% Better Insights

    Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information....

    Provided By Hewlett-Packard

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Provided By Imperva

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Jul 2014

    Application, Usage and Threat Report

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Provided By Palo Alto Networks

  • White Papers // May 2014

    Five Critical Steps to Achieving an Effective Application Security Program

    This white paper provides five practical steps organizations can incorporate into every phase of the development process to improve their application security postures, as well as an overview of application threats and the types of risks they need to prioritize and remediate.

    Provided By IBM

  • White Papers // May 2014

    Streamlined server management at every stage of the IT life cycle

    Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides...

    Provided By HP & Intel® Xeon® Processor

  • White Papers // May 2014

    IDC Report: Selecting the Optimal Path to Private Cloud

    Cloud computing models offer a new approach for IT organizations to deliver business services to end users. By implementing their own internal or "private" cloud infrastructures, IT organizations can deploy a technology model that provides both flexible IT architectures and dynamic business agility.It makes system resources accessible to applications that...

    Provided By EMC

  • White Papers // May 2014

    Deduplication solutions are not all created equal, why Data Domain?

    There is a common misconception that all deduplication systems are created the same and many organisations are doing their homework prior to making a purchase decision. There are certain key things to look for when you are researching a deduplication storage solution and that is the subject of this whitepaper....

    Provided By EMC

  • White Papers // May 2014

    The Forrester Wave™: File Sync and Share Platforms

    Consumerization Has Made File Sync And Share A Must-Have Capability The explosive proliferation of powerful mobile devices has led to employee demand for solutions that will allow seamless access to enterprise content from any device. Solutions like Dropbox, originally developed for consumer usage, have barged into the enterprise, forcing IT...

    Provided By EMC

  • White Papers // May 2014

    EMC Syncplicity: Simple and secure enterprise file sync and share with EMC Isilon

    While today’s consumer-oriented, cloud-based approaches to online file sharing offer flexibility and mobility for busy, on-the-go business users, many organizations have serious concerns about the reliability of the storage and security of data that is placed into cloud-based infrastructure that is managed by third party organizations. Providing business users with...

    Provided By EMC

  • Downloads // May 2014

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • White Papers // Jun 2014

    Top 7 Benefits of an Enterprise-Class Hybrid Cloud for Government

    VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud service that delivers the tried and tested VMware capabilities widely used by government organizations today, with the added security and compliance assurance of FedRAMP authorization. The hybrid cloud is becoming more and more prevalent – in fact,...

    Provided By VMware

  • White Papers // Jun 2014

    A Guide to Hybrid Cloud for Government Agencies An inside-out approach for extending your data center to the cloud

    The majority of government customers operate some combination of onsite and offsite IT environments and are struggling to manage both new and legacy applications and infrastructure. Enterprise-class hybrid cloud empowers government customers to leverage existing investments in applications and infrastructure, and avoid the complexity of having to rewrite applications to...

    Provided By VMware

  • White Papers // Jun 2014

    Migrating to an Enterprise-Class Hybrid Cloud for Government: Top 5 Considerations

    VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud solution built on vSphere®, which empowers government customers to leverage existing investments in applications and infrastructure. As a result, government agencies can avoid the cost and complexity of re-architecting and retraining sta¬ff for public cloud infrastructure that is...

    Provided By VMware

  • White Papers // Jun 2014

    IBM MobileFirst Managed Mobility Services service profile

    Now you can cut through the complexity by using Managed Mobility Services as the framework for your mobility efforts, creating new levels of productivity for employees and transforming your business processes. Read the service profile to learn how IBM MobileFirst can help you create a security-rich, flexible technology environment that...

    Provided By IBM

  • White Papers // Jun 2014

    The case for cloud-based data backup - IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

    Using tape may be appropriate for long-term data storage, but many IT executives find it too expensive, inefficient and unreliable for day-to-day data backup. It is also typically not suitable for backing up data stored on virtualized servers. Learn how IBM SmartCloud Managed Backup cloud services can lower costs while...

    Provided By IBM

  • Analyst Briefings // Jun 2014

    The Reputational Impact of IT Risk with Forbes Insight

    This report from Forbes Insights provides valuable information on howSecurity and resilience affect nearly every aspect of your company, including your brand value and reputation.

    Provided By IBM

  • White Papers // Jun 2014

    The Seven Essential Practices For Effective Business Continuity Management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Provided By IBM

  • Presentations // Jun 2014

    Tipping point presentation

    Cloud resilience has come of age and the benefits to the IT organization may be obvious. Understand how it may be time for your organization to jump on cloud too. This presentation helps you to make the case for cloud and achieve a higher level of business resilience.

    Provided By IBM

  • White Papers // Jun 2014

    Follow the money, Follow the crime

    A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

    Provided By IBM

  • White Papers // Jun 2014

    2014 Cost of Data Breach Study, From Ponemon Institute, Sponsored by IBM

    IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out...

    Provided By IBM

  • White Papers // Jun 2014

    Enterprise Mobility Management: A Data Security Checklist

    Secure file sharing, syncing and associated productivity requirements impose pressing technical and operational challenges on organizations. This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.

    Provided By Accellion

  • White Papers // Jun 2014

    2014 Global Cost of Data Breach Study

    How much can a data breach cost? And are you doing enough to prevent it from happening to you? The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations. Read this critical research to...

    Provided By IBM

  • White Papers // Jun 2014

    2014 IBM Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Provided By IBM

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Provided By IBM

  • Analyst Briefings // Jun 2014

    Critical Data Protection Program by IBM Security Services

    Critical data is the small but most important portion of data vital to business survival and success. It includes sensitive financial and customer data, data that enables critical business processes, and proprietary data such as trade secrets, intellectual property, research and development, and confidential business plans and communications, learn how...

    Provided By IBM

  • White Papers // Jun 2014

    Gartner Magic Quadrant paper

    Latest Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute" and "completeness of vision."

    Provided By IBM

  • White Papers // Jun 2014

    IBM Security Services 2014 Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Provided By IBM

  • Analyst Briefings // Jun 2014

    IBM X-Force Threat Intelligence Quarterly - Q1 2014

    Understand more about the latest IT security threats. This report is an analysis of the security landscape, designed to help organizations better understand the latest security risks. Download this comprehensive report and learn how: Security incidents have been steadily rising in 2013. Cyber-criminals use malicious code to infiltrate companies. Public...

    Provided By IBM

  • White Papers // Jun 2014

    The Challenge of Protecting Critical Data

    Protection of the most valuable data should be a central, clearly defined and constant component in an overall security strategy, read this report to understand how senior executives can identify their “crown jewels” in a mountain of sensitive enterprise data.

    Provided By IBM

  • White Papers // May 2014

    Gartner 2013 MarketScope Report for Web Access Management

    Industry analyst firm Gartner, Inc. reviews vendor solutions for Web Access Management (WAM). Download the Nov. 2013 Gartner report to learn: Emerging trends in WAM market; Typical WAM use cases and solutions; WAM vendor rankings and analysis.

    Provided By IBM

  • White Papers // May 2014

    Gartner Research Paper: Private Cloud Matures, Hybrid Cloud Is Next

    Nearly half of large enterprises polled have deployed a private cloud service, and only 11% have no plans to do so through 2014. While actual hybrid cloud computing deployments are rare, nearly three-fourths of large enterprises expect to have hybrid deployments by 2015.

    Provided By VMware

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Improving Sales Teams

    WebEx enables sales teams to effectively and efficiently connect with customers around the globe. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems