Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Improving Sales Teams

    WebEx enables sales teams to effectively and efficiently connect with customers around the globe. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Hosting Webinars

    Use WebEx to host webinars, tell your story and connect to global audiences. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • White Papers // Jun 2014

    Integration of a Predictive, Continuous Time Neural Network Into Securities Market Trading Operations

    In this paper, the authors have presented an example of deep learning, namely the integration of a predictive, continuous time recurrent neural network into trading and risk assessment operations. During application within a trading environment the potential need to adapt technical analysis indicators that their use might be continued and...

    Provided By Cornell University

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Jun 2014

    Four Steps to Deafeat a DDoS Attack

    Over the past several years, the industrialization of attacks and the rise of hacktivism have resulted in an explosion of powerful and destructive DDoS attacks. Using off-the-shelf toolkits, criminals can quickly build botnets of thousands or even millions of computers. Malicious users can rent these botnets to unleash destructive DDoS...

    Provided By Imperva

  • Case Studies // Jun 2014

    Schneider Electric Case Study

    Global energy management giant based in France rolled out Box to 67,000 employees, enabled BYOD, and boosted productivity. Use Box for RFPs, vendor collaboration, executives, sales presentations. Cut server costs by 30%. Energy industry, large company, EMEA, global, sales LOB, BYOD, server replacement.

    Provided By Box

  • Case Studies // Jun 2014

    Dynamic Systems - SkySync Case Study

    Midsize construction company uses Box to collaborate with partners, but uses SharePoint internally. They used SkySync to sync partner portals in Box with SharePoint -- while matching SharePoint's existing security settings and folder structures. Construction company, midsize company, midmarket, SharePoint, SkySync, partner portal, NA, security.

    Provided By Box

  • White Papers // Jun 2014

    Three Best Practices to Help Enterprises Overcome BYOD Challenges

    An increasing number of white-collar workers in the United States use a mobile device for work. This new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges, as well as best practices for ensuring security and productivity.

    Provided By AVI-SPL

  • White Papers // Jun 2014

    The State of Video Conferencing Security

    Video conferencing equipment, found in almost every boardroom around the world, may be opening up companies to serious security breaches. Demonstrations have proved that there is a myriad of information that can be gleaned—from confidential discussions to the ability to zoom in and read top-secret documents—once a video conference system...

    Provided By AVI-SPL

  • White Papers // Jun 2014

    Take control of large file sharing services

    Bloor Research outlines best practice for large file sharing in the enterprise and assesses current vendors.

    Provided By Mimecast

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Provided By McAfee

  • White Papers // May 2014

    Advanced Malware Protection Everywhere (AMP)

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    EMC’s Flash Strategy

    Beyond the hardware, a key part of EMC’s differentiation and strategy (and likely a glimpse at the future in our newly software-defined world) is software. This is not only the caching algorithms and management protocols for all the hardware mentioned above, but also EMC Fully Automated Storage Tiering (FAST) that...

    Provided By EMC

  • White Papers // May 2014

    EMC XtremIO- Executive Overview

    XtremIO develops enterprise data storage systems based completely on random access media such as flash solid state drives (SSDs). By leveraging the underlying abilities of random access media, XtremeIO delivers unparalleled levels of performance, ease of use, operational efficiency and other advanced storage features.

    Provided By EMC

  • White Papers // May 2014

    Tyco Integrated Security: National Crime Infographic

    This helpful and valuable infographics shows the crime trends across the United States and how Tyco Integrated Security helps real world companies achieve their security and business goals. This demonstrates how safe is your business really is by illustrating crime trends and statistics from across the United States that business...

    Provided By Tyco

  • White Papers // May 2014

    Tyco Integrated Security: Overall Crime Index for Your Area

    This helpful and informative Crime Index shows detailed scores that indicate the relative risk of crime at a specific address or site listed as compared to national averages. A Crime Index score of 256 means that the risk of crime at the location is 2.56 times that of the national...

    Provided By Tyco

  • White Papers // May 2014

    Top Things You Should Know About 802.11ac

    802.11ac is faster, goes further, even for legacy 802.11n clients and is more secure. Plus, 802.11ac is more power efficient, extending battery life over 30%. Get the 802.11ac In-Depth Whitepaper and find out more about this state-of-the-art Wi-Fi technology!

    Provided By Aruba Networks

  • White Papers // May 2014

    Wi-Fi Access For Mobile Devices In High-Security Environments

    The Aruba Tunneled Internet Gateway lets mobile device users wirelessly access the Internet without compromising the security of the restricted network. Unsecure Internet traffic is logically and cryptographically separated from restricted network traffic across the entire network.

    Provided By Aruba Networks

  • White Papers // May 2014

    The Truth About Customer Experience

    Business leaders and support technicians across industries are tasked with enhancing the customer experience at every touchpoint. But this is easier said than done. This article from Harvard Business Review emphasizes the importance of quality interactions pre- and post-sale, and sheds light on the big picture: the customer’s end-to-end journey....

    Provided By LogMeIn Rescue

  • White Papers // May 2014

    Microsoft Office 365 for the Enterprise

    Microsoft ventures into cloud services space for the first time in 13 years with Office 365. While this robust email and collaboration tool has many benefits as a hosted service, there are still enhancements that require a third party support. This whitepaper will explore the security, archiving and encryption capabilities...

    Provided By Mimecast

  • White Papers // May 2014

    Bloor Research: Essential Email Security

    Email as a business record, requires high standards of security to be applied so that employees of an organisation can communicate and collaborate with each other and with customers and business partners effectively and efficiently without falling prey to the threats posed by email-borne malware and data leakage or exfiltration....

    Provided By Mimecast

  • Downloads // May 2014

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • White Papers // May 2014

    Living with BYOD in Your Organization

    Explore the benefits and risks of BYODA and how to effectively manage BYODA within your organization. Download the White Paper to learn about the 5 key factors about BYOD and BYOA as well as some essentials steps in effectively managing your device and how to protect your organization.

    Provided By Citrix Online

  • White Papers // May 2014

    IDC Report: Selecting the Optimal Path to Private Cloud

    Cloud computing models offer a new approach for IT organizations to deliver business services to end users. By implementing their own internal or "private" cloud infrastructures, IT organizations can deploy a technology model that provides both flexible IT architectures and dynamic business agility.It makes system resources accessible to applications that...

    Provided By EMC

  • White Papers // May 2014

    Deduplication solutions are not all created equal, why Data Domain?

    There is a common misconception that all deduplication systems are created the same and many organisations are doing their homework prior to making a purchase decision. There are certain key things to look for when you are researching a deduplication storage solution and that is the subject of this whitepaper....

    Provided By EMC

  • White Papers // May 2014

    The Forrester Wave™: File Sync and Share Platforms

    Consumerization Has Made File Sync And Share A Must-Have Capability The explosive proliferation of powerful mobile devices has led to employee demand for solutions that will allow seamless access to enterprise content from any device. Solutions like Dropbox, originally developed for consumer usage, have barged into the enterprise, forcing IT...

    Provided By EMC

  • White Papers // May 2014

    EMC Syncplicity: Simple and secure enterprise file sync and share with EMC Isilon

    While today’s consumer-oriented, cloud-based approaches to online file sharing offer flexibility and mobility for busy, on-the-go business users, many organizations have serious concerns about the reliability of the storage and security of data that is placed into cloud-based infrastructure that is managed by third party organizations. Providing business users with...

    Provided By EMC

  • White Papers // May 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

    Provided By Trend Micro

  • White Papers // May 2014

    Why a New Business Model is Needed for SSL Certificates

    The de facto Internet communication security protocol in use today is Secure Sockets Layer (SSL), used most commonly for browser-to-Web server communications, but increasingly for connections between applications when transferring critical business content.

    Provided By Trend Micro

  • White Papers // May 2014

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Provided By Trend Micro

  • White Papers // May 2014

    Chartis - The Risk Enabled Enterprise - Global Survey Results and Two-year Research Agenda

    This two year research initiative in collaboration with IBM focuses on key trends, best practices, challenges, and priorities in enterprise risk management and covers topics as diverse as culture, organizational structure, data, systems, and processes.

    Provided By IBM

  • White Papers // May 2014

    Deploying a big data solution using IBM GPFS

    Every day, the world creates 2.5 quintillion bytes of data and businesses are realizing tangible results from investments in big data analytics. IBM® General Parallel File System (GPFS™) offers an enterprise class alternative to Hadoop Distributed File System (HDFS) for building big data platforms and provides a range of enterprise-class...

    Provided By IBM

  • White Papers // May 2014

    IBM Storage with OpenStack Brings Simplicity and Robustness to Cloud

    While many storage vendors have submitted OpenStack drivers for their equipment, IBM has gone much further than that to support the OpenStack community. Read this paper and learn how.

    Provided By IBM

  • White Papers // May 2014

    IBM's New Ultra-dense, Hyper-Scale NeXtScale Server Environment

    IBM NeXtscale System is changing system design dynamics in the HPC marketplace with ultra-dense servers. Enterprises looking for raw computing power and throughput to handle technical computing, cloud, grid and analytics should evaluate this new ultra-dense, highly scalable systems design. Read the paper by Clabby Analytics to learn more.

    Provided By IBM

  • Webcasts // May 2014

    Make the Hybrid Cloud work for you

    Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics...

    Provided By IBM

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Provided By IBM

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM