Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014 (CASR)

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Sponsored By Sourcefire, Inc.

  • White Papers // Mar 2014

    Advanced Malware Protection: Buying Criteria

    In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    SANS: Calculating Total Cost of Ownership on Intrusion Prevention Technology

    Intrusion prevention technology stops adverse events in real-time, sparing organisations from the disruption and loss that might otherwise have occurred. With advanced correlation and automation, there are many areas in which IPSs can save organisations time and money. This paper, while not scientific, attempts to calculate the value of...

    Sponsored By Sourcefire, Inc.

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Sponsored By Dell Software

  • Case Studies // Mar 2014

    Next-Generation Network Security: Buyer's Criteria

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Sponsored By Sourcefire, Inc.

  • White Papers // Mar 2014

    Today's Biggest IT Risks : Defending Against Malware -A Holistic Approach

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • Case Studies // Mar 2014

    Buyer's Criteria for Next-Generation Network Security

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Addressing the Malware Challenge - Strategies at Work: An IANS Custom Report

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

    Sponsored By Sourcefire, Inc.

  • White Papers // Mar 2014

    Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • White Papers // Mar 2014

    Attack Path Analytics: A Strategic Approach to Vulnerability Remediation

    Security organizations have no problem finding vulnerabilities on enterprise networks – the volume of security data is constantly growing. The greater challenge is sifting through this data to determine which situations present the greatest risk to the business and prioritizing remediation efforts. Read this white paper to find out the...

    Sponsored By Tenable Network Security

  • eBooks // Feb 2014

    Patch Management Best Practices for IT Professionals

    Patch management is one of the largest concerns of IT professionals. With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In addition, the lag time between when vulnerability is discovered and when a virus or worm appears is...

    Sponsored By LabTech Software

  • eBooks // Feb 2014

    Achieve Deeper Network Security and Application Control (ebook)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Mobile Security: How to Protect the Enterprise in the Mobile Era

    Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Next-Gen Security

    Find out how SSL decryption and inspection can keep attackers away from your data and out of your network. Given that SSL threats are likely to increase, it’s more important than ever for businesses to consider purchasing next-generation firewalls.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Achieve Deeper Network Security and Application Control (white paper)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Mobile Connect

    Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.

    Sponsored By Dell Software

  • eBooks // Feb 2014

    Mobile Security: How an Organization Can Control Growing Threats with Mobile Device Management

    From smartphones to tablets, as the popularity of mobile devices grows, the opportunity for security breaches grows as well, placing a new burden on IT departments. By providing mobile device management, IT professionals can ensure their organization remains protected from mobile security threats. Download the Mobile Security: Controlling Growing Threats...

    Sponsored By LabTech Software

  • Case Studies // Feb 2014

    Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • Case Studies // Feb 2014

    2013 Gartner Magic Quadrant for Security Intelligence & Event Management (SIEM)

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Feb 2014

    Powering Transformation - The IT Revolution is Now

    The IT Revolution is happening and the time for change is now - don’t settle for inflexible systems built on legacy technology. Download this white paper for information and ideas on how you can: Get the most out of managing IT in the cloud Eliminate upfront investments and maintenance costs...

    Sponsored By ServiceNow

  • Webcasts // Feb 2014

    On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

    Sponsored By ZDNet

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • White Papers // Feb 2014

    Cloud Vs. On-Site Security Myths

    Many organizations shy away from hosted and cloud-based services due to security qualms. But often those fears are based on flawed assumptions about the security of cloud environments compared to in-house counterparts. We take a clear-headed look at how cloud security truly stacks up against traditional environments when it comes...

    Sponsored By INetU

  • White Papers // Feb 2014

    The Cloud Provider Prescription To Prevent HIPAA Headaches

    Technology service providers who market to healthcare organizations have long had to contend with the intricacies and nuances of the data privacy provisions in the Health Insurance Portability and Accountability Act (HIPAA). Whether cloud providers, electronic health record (EHR) services firms or software as a service (SaaS) providers, these companies...

    Sponsored By INetU

  • White Papers // Feb 2014

    5 Ways Hosting Providers Prepare Clients for PCI 3.0

    With the unveiling of new rule changes by the Payment Card Industry (PCI) Security Standards Council (SSC) in November 2013, enterprise compliance and security professionals face the third full evolution of PCI Data Security Standards since its introduction. With added requirements around practices such as risk management and third-party responsibility,...

    Sponsored By INetU

  • White Papers // Feb 2014

    Post-Breach Survival Guide

    The onslaught of cyber-attacks and organized criminals seeking to steal corporate data has put even the most well-defended organizations at risk of suffering a data breach. While organizations shouldn’t give up their efforts to institute preventative IT security controls, they should also steel themselves to the all-too-real possibility of suffering...

    Sponsored By INetU

  • White Papers // Feb 2014

    Data Center Encryption Survey - Securing the Path to Consolidation in Today's Data Center

    Many want to make data center consolidation happen, but few have actually done so. While cloud offerings and virtualization have opened up a path for realizing the benefits of consolidation, many organizations are encountering significant hurdles in this journey. A SafeNet survey of more than 580 IT and security professionals...

    Sponsored By SafeNet

  • White Papers // Feb 2014

    Encryption, Key Management, and Consolidation in Today’s Data Center

    Today, organizations’ leadership teams are striving to meet their competitive demands for agility and innovation, while wringing the most value from their IT expenditures. Consequently, these executives continue to pursue data center consolidation by reducing the number of physical data center sites, expanding the use of virtualization, and adopting cloud...

    Sponsored By SafeNet

  • Downloads // Feb 2014

    AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

    Sponsored By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

    Sponsored By Message Systems

  • White Papers // Feb 2014

    A reliable platform that helps facilitate HIPAA and HITECH compliance

    In today’s business climate of strict government regulation healthcare organizations are ramping up their IT resources, exhausting every option available to remain compliant with the Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH). They don’t have much choice with regards...

    Sponsored By OpenText

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Sponsored By Symantec

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Sponsored By Hewlett-Packard & Intel®

  • White Papers // Feb 2014

    IAM for the Real World – Privileged Account Management

    Read this e-book for essential information on the common security issues with privileged account management – and how you can minimize or eliminate them.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    What to Look for When Evaluating Next-Generation Firewalls

    This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality. See why not all next-generation firewalls offer the same level of protection – get your copy now.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    RocketSpace case study

    In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Quantifying the Impact of Network-Based Attacks

    This document gives you some guidelines on how to assess the impact of network-based attacks and suggests techniques for creating your own economic model. Get your copy today.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How traditional firewalls fail

    Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren’t effective in today’s world. This e-book explains where traditional firewalls fall short – and what you can do about it.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How to Build a Massively Scalable Next-Generation Firewall

    Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.

    Sponsored By Dell Software