Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Aug 2014

    The Big Data Service Desk - 3 Ways Big Data Can Transform your Service Desk

    Proactive problem solving. When you connect the intelligence of agents and users, you can analyze trends, anticipate user issues, and adjust to future business needs. Read this white paper and learn how.

    Sponsored By HP

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By Hewlett Packard

  • White Papers // Jun 2013

    Deliver Enterprise Mobility with Citrix XenMobile and Citrix Netscaler

    Mobility and the consumerisation of IT pose key challenges for IT around scalability, security and application visibility. Citrix solutions including Citrix XenMobile and Citrix NetScaler provide a complete, integrated and scalable solution to deliver apps and data to any device with full security and a high-performance user experience. Read more...

    Sponsored By Citrix

  • White Papers // Aug 2014

    Countering Cyber Threats by Modeling “Normal” Website Behavior

    This white paper chronicles the evolution of web and mobile threats, the economic impact of cybercrime and business logic abuse, and how organizations could be leveraging the data in their network to foil the top attacks with behavioral analytics.

    Sponsored By RSA

  • White Papers // Aug 2014

    Combatting Digital Fraud: A CIO Report

    Combating digital fraud has become a business issue and presents risk for any organization with online operations. Gain perspective from CIOs on what organizations can do to prevent fraud in digital commerce.

    Sponsored By RSA

  • White Papers // Aug 2014

    ORSA State of Readiness Survey: Addressing the Readiness of US Insurers for the RMORSA

    IBM conducted a survey of senior risk officers at US insurers to determine their level of preparedness for ORSA. This paper discusses their responses.

    Sponsored By IBM

  • White Papers // May 2014

    Tyco Integrated Security: Overall Crime Index for Your Area

    This helpful and informative Crime Index shows detailed scores that indicate the relative risk of crime at a specific address or site listed as compared to national averages. A Crime Index score of 256 means that the risk of crime at the location is 2.56 times that of the national...

    Provided By Tyco

  • White Papers // Apr 2014

    Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

    Provided By ZDNet

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS

  • White Papers // Jan 2014

    Understanding the Economics of IT Risk and Reputation

    Which IT risks cause the most financial damage? What can you do now to address IT and reputational risk? A recent worldwide IBM study focused on understanding the financial and reputational consequences of IT failures. We set out to discover the elusive numbers that organizations need for building a business...

    Provided By IBM

  • Downloads // Jun 2009

    End-user password security

    Protecting your organization's important data starts with password security best practices. Use this Microsoft PowerPoint presentation to teach your users how to create strong passwords that are easy to remember.

    Provided By TechRepublic.com

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Provided By IBM

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • White Papers // Nov 2013

    Signature Verification System Using MATLAB

    Signature continue to be an important biometric for authenticating the identity of human beings. This paper presents an effective method to perform Off-line signature verification using unique structural features extracted from the signature's contour. A novel combination of Modified Direction Feature (MDF) and additional distinguishing features such as the centroid,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Jul 2011

    Practical Real-Time Intrusion Detection Using Machine Learning Approaches

    The growing prevalence of network attacks is a well-known problem which can impact the availability, confidentiality, and integrity of critical information for both individuals and enterprises. In this paper, the authors propose a real-time intrusion detection approach using a supervised machine learning technique. Their approach is simple and efficient, and...

    Provided By Reed Elsevier

  • White Papers // Oct 2007

    Building a Better Network Access Control RFP: How to Get the Best Solution for Your Business

    This white paper seeks to simplify the RFP process for organizations seeking the network access control vendor that best suits their security needs. While requirements vary according to each organization's unique network infrastructure, user profile, and security expectations, some features are common to the most robust NAC solutions. Most notably,...

    Provided By Mirage Networks

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Provided By Dell Software

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Provided By IBM

  • White Papers // Oct 2009

    Software Security Test Data Generation Based on Genetic Algorithms

    Software security is an important quality. The software security testing is one of the most important kinds of the software testing. How to test the software security, and especially to automatically generate security test cases are major problems. An improved method of the test data generation based on Genetic Algorithm...

    Provided By Academy Publisher

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • White Papers // May 2014

    Implementation guide for a facilities management system

    Successful implementation of a facilities management system begins with a business case - and focuses on business goals as technology deployment proceeds. This guide addresses business goals in key facilities management areas and includes an overview of the software implementation process.

    Provided By IBM

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec