Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Downloads // Jan 2014

    Do More, Spend Less. Top 5 Reasons to Choose SolarWinds Log & Event Manager

    Real-Time, In-Memory, Event Log Correlation:Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations. Out-of-the-Box Security and Compliance Reporting Templates:Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates. Fast and Easy Forensic Analysis:Quickly conduct forensic analysis to figure...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    Simplify remote IT administration with DameWare Remote Support

    Support hundreds of end-users without having to leave your desk. DameWare Remote Support is an easy to-use sysadmin tool that lets you manage servers and workstations remotely, and deliver faster support for end-users. From a single, user-friendly interface, initiate multiple remote sessions with Windows®, Linux®, and Mac OS® X systems....

    Sponsored By SolarWinds

  • eBooks // Feb 2015

    Executive's guide to the next wave of security challenges

    The proliferation of cyberattacks and the failure of traditional tools to safeguard businesses and individuals have brought us to a new reality: It's no longer a matter of if you're attacked, but when and how. To help you stay on top of current and emerging security concerns and build effective...

    Provided By TechRepublic

  • eBooks // May 2014

    Software Defined Storage for Dummies

    This book examines data storage and management challenges and explains software-defined storage, an innovative solution for high-performance, cost-effective storage using the IBM General Parallel File System (GPFS).

    Provided By IBM

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Provided By Symantec

  • White Papers // Feb 2015

    Next Generation Criminal Fraud Detection

    With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there...

    Provided By IBM

  • eBooks // Oct 2014

    Web Application Security for Dummies

    This book simply explains all about web application security. After reading this book you'll know how to use a web application security scanner to quickly find vulnerabilities and remediate them for stronger security. Learn more...

    Provided By Qualys

  • White Papers // Feb 2014

    Anatomy of a Cyber-Attack

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Provided By Dell Software

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Provided By Alert Logic

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Provided By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Provided By Symantec

  • White Papers // Aug 2014

    What to Look For When Evaluating NGFW

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

    Provided By Dell Software

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Provided By Dell Software

  • White Papers // Feb 2014

    Applying Agile Principles to the Development of Smarter Products

    Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.

    Provided By IBM

  • White Papers // Nov 2013

    Signature Verification System Using MATLAB

    Signature continue to be an important biometric for authenticating the identity of human beings. This paper presents an effective method to perform Off-line signature verification using unique structural features extracted from the signature's contour. A novel combination of Modified Direction Feature (MDF) and additional distinguishing features such as the centroid,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2015

    Defending against malware: A holistic approach to one of today's biggest IT risk

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Read More.....

    Provided By IBM

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Provided By Symantec

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Provided By Proofpoint

  • White Papers // Jan 2015

    Is your platform secure? Really?

    The introduction of the cloud architecture, with its virtualizati on basis, has created new avenues of attack. The challenge of protecting the organizational assets and process, while avoiding adverse impact on service levels, is growing. Although many organizations view security as a simplistic access to assets, the Solitaire Interglobal Ltd....

    Provided By IBM

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Provided By Symantec

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Provided By IBM

  • White Papers // Apr 2009

    Change Management Best Practices for the Engineering and Construction Industry

    Construction contracts differ from most legal agreements in that they expect and plan for changes. The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a constructing project, and provide a process to effectively manage changes on construction projects. It...

    Provided By Oracle

  • Tools & Templates // Apr 2010

    Virus & Spyware Removal Checklist

    Eliminating malware requires a systematic process with no missed steps. This checklist will make it easier to do an effective, thorough job.Visit our IT Security blog for more information on combating viruses, spyware, and rootkits.

    Provided By Erik Eckel

  • White Papers // Dec 2010

    Effective Realization of QoS , Network Scalability in Term of Network Security Using Symmetric Algorithm

    Computer networks able to support multimedia applications with diverse QoS performance requirements are evolving. To ensure that multimedia applications will be guaranteed the required QoS, Presently, there are various kinds of networks; wired and wireless that co-exists with each other. These networks have QoS characteristics that are drastically different and...

    Provided By Kurukshetra University

  • White Papers // Jul 2014

    Stepping Into the Cloud:  A Practical Guide to Creating and Implementing a Successful Cloud Strategy

    There’s no such thing as “the cloud,” says this Frost & Sullivan executive brief. It’s more useful to think of the cloud as shorthand for a range of service and deployment models. This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with...

    Provided By IBM

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Mar 2015

    Infrastructure Matters: Disaster Recovery Overview

    This solution overview guide demonstrates how our services can help to give your users the level of data availability they have come to expect everywhere else. Read More..

    Provided By Fujitsu

  • Analyst Briefings // Oct 2014

    IBM MQ: The Messaging Solution for Virtually all Industries

    Process Management is an effective tool for increasing visibility and control while delivering consistency and governance. In an era of rapid change, multiple channels, demanding consumers and Big Data applying Decision Management delivers increased business impact.

    Provided By IBM

  • White Papers // Aug 2014

    Secure Mobile Access

    Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.

    Provided By Dell Software

  • White Papers // Aug 2014

    Overcoming Exploits that Use Advanced Evasion Techniques and SSL Encryption

    To defend against today’s advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

    Provided By Dell Software

  • eBooks // Aug 2014

    Achieve Deeper Network Security and Application Control

    Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we know it. Traditional firewalls that only focus on stateful packet inspection and access control rules are not effective in today’s advanced-threat environment.

    Provided By Dell Software

  • Book chapters // Oct 2005

    Bypass the BIOS password by hacking your CMOS settings

    Recover from a CMOS memory-affecting virus or work around a boot-time password by making BIOS forget all it once knew. A BIOS password can be very effective at controlling access to your personal computer. If the computer won't boot up until a password is entered it is...

    Provided By O'Reilly Media

  • White Papers // Nov 2005

    ITIL, IT Governance & the Managed Service Provider (MSP)

    Organizations are adopting ITIL to provide a framework for best practices, and, many of these organizations are seeking out external partners who use complementary, compatible processes. These organizations want to share the same consistent, common language as they contract out and transition a specific area of their IT organization. Consequently,...

    Provided By Pink Elephant

  • Downloads // Nov 2006

    10+ e-mail best practices to share with your users

    These days, e-mail is used by just about everyone. Unfortunately, a lot of users out there don't use it right, flirting with security risks, consuming excessive bandwidth, and practicing lousy etiquette. These basic usage guidelines, encompassing things like virus protection, e-mail scams, attachments, and forwarding practices, will help safeguard your...

    Provided By TechRepublic

  • Downloads // Aug 2010

    Sample storage service catalog

    This sample Excel worksheet allows administrators to quantify the storage offering for their storage area network (SAN) and data protection infrastructures. The material is an adaptation of the Storage Networking Industry Association's Tiered Services Catalog. Read the related entry in our Servers and Storage blog.

    Provided By Rick Vanover

  • White Papers // Dec 2011

    Use of Applets for Java Cards Technology for Smart Cards

    Java Card technology enables smart cards and other devices with very limited memory to run small applications, called applets, which employ Java technology with a secure and interoperable execution platform that can store and update multiple applications on a single device. This accelerated process reduces development costs, increases product differentiation,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Provided By Dell Software