Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Jun 2013

    Deliver Enterprise Mobility with Citrix XenMobile and Citrix Netscaler

    Mobility and the consumerisation of IT pose key challenges for IT around scalability, security and application visibility. Citrix solutions including Citrix XenMobile and Citrix NetScaler provide a complete, integrated and scalable solution to deliver apps and data to any device with full security and a high-performance user experience. Read more...

    Sponsored By Citrix

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Aug 2014

    The Big Data Service Desk - 3 Ways Big Data Can Transform your Service Desk

    Proactive problem solving. When you connect the intelligence of agents and users, you can analyze trends, anticipate user issues, and adjust to future business needs. Read this white paper and learn how.

    Sponsored By HP

  • White Papers // Apr 2014

    Building a Business Case for Continuity and Resiliency

    Based on findings from the largest study of its kind—the IBM Global Study on the Economic Impact of IT Risk—which surveyed 2,136 IT professionals around the world, 1,069 of them business continuity professionals looks at the cost data you need to build a business case for continuity and resiliency. Uncover...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • White Papers // Sep 2014

    Expand Your Virtual Infrastructure With Confidence And Control

    Is your virtualized infrastructure operating at peak efficiency and performance? If your infrastructure is growing while your IT headcount is flat, most likely you have a hard time answering that question with confidence. In December 2013, VMware commissioned Forrester Consulting to evaluate how small and midsize companies manage virtualization...

    Sponsored By VMware

  • White Papers // Sep 2014

    Three Things Your Old Version of vSphere Doesn’t Do

    With VMware® vSphere® software, you have already seen the benefits of the world’s leading virtualization platform. However, vSphere alone doesn’t have all of the tools you need to realise the most value from your investments. To achieve peak performance and intelligently scale your virtual environment, you need tools to help...

    Sponsored By VMware

  • White Papers // May 2014

    HP TippingPoint Next-Generation Firewall

    This paper explores the threats, security risks and cyber attacks evolving in IT infrastructure, networks and data centres.

    Sponsored By HP

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // May 2014

    Case Study: Transplace improves network security and availability with TippingPoint IPS

    It's necessary to have a better network security and protect your business from any attacks. This case study provides some insights on how to improve network security and availability. Read this report now to learn how HP helped Transplace identifies the source of security attacks and solve them before...

    Sponsored By HP

  • White Papers // Aug 2014

    Announcing the New Intel Parallel Studio XE 2015

    Intel Parallel Studio XE 2015 is an advanced, comprehensive tool suite that simplifies debugging and tuning, and speeds development. Available in C, C ++, and FORTRAN. Speed time to market: Composer Edition: Includes industry-leading compilers and libraries that are optimized for creating fast parallel code. Professional Edition: Everything in...

    Sponsored By Intel Software

  • White Papers // May 2014

    Tyco Integrated Security: Overall Crime Index for Your Area

    This helpful and informative Crime Index shows detailed scores that indicate the relative risk of crime at a specific address or site listed as compared to national averages. A Crime Index score of 256 means that the risk of crime at the location is 2.56 times that of the national...

    Provided By Tyco

  • White Papers // Apr 2014

    Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

    Provided By ZDNet

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS

  • White Papers // Jan 2014

    Understanding the Economics of IT Risk and Reputation

    Which IT risks cause the most financial damage? What can you do now to address IT and reputational risk? A recent worldwide IBM study focused on understanding the financial and reputational consequences of IT failures. We set out to discover the elusive numbers that organizations need for building a business...

    Provided By IBM

  • Downloads // Jun 2009

    End-user password security

    Protecting your organization's important data starts with password security best practices. Use this Microsoft PowerPoint presentation to teach your users how to create strong passwords that are easy to remember.

    Provided By TechRepublic.com

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Provided By IBM

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • White Papers // Nov 2013

    Signature Verification System Using MATLAB

    Signature continue to be an important biometric for authenticating the identity of human beings. This paper presents an effective method to perform Off-line signature verification using unique structural features extracted from the signature's contour. A novel combination of Modified Direction Feature (MDF) and additional distinguishing features such as the centroid,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Jul 2011

    Practical Real-Time Intrusion Detection Using Machine Learning Approaches

    The growing prevalence of network attacks is a well-known problem which can impact the availability, confidentiality, and integrity of critical information for both individuals and enterprises. In this paper, the authors propose a real-time intrusion detection approach using a supervised machine learning technique. Their approach is simple and efficient, and...

    Provided By Reed Elsevier

  • White Papers // Oct 2007

    Building a Better Network Access Control RFP: How to Get the Best Solution for Your Business

    This white paper seeks to simplify the RFP process for organizations seeking the network access control vendor that best suits their security needs. While requirements vary according to each organization's unique network infrastructure, user profile, and security expectations, some features are common to the most robust NAC solutions. Most notably,...

    Provided By Mirage Networks

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Provided By Dell Software

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Provided By IBM

  • White Papers // Oct 2009

    Software Security Test Data Generation Based on Genetic Algorithms

    Software security is an important quality. The software security testing is one of the most important kinds of the software testing. How to test the software security, and especially to automatically generate security test cases are major problems. An improved method of the test data generation based on Genetic Algorithm...

    Provided By Academy Publisher

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • White Papers // May 2014

    Implementation guide for a facilities management system

    Successful implementation of a facilities management system begins with a business case - and focuses on business goals as technology deployment proceeds. This guide addresses business goals in key facilities management areas and includes an overview of the software implementation process.

    Provided By IBM

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec