Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Downloads // May 2014

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • White Papers // May 2014

    Living with BYOD in Your Organization

    Explore the benefits and risks of BYODA and how to effectively manage BYODA within your organization. Download the White Paper to learn about the 5 key factors about BYOD and BYOA as well as some essentials steps in effectively managing your device and how to protect your organization.

    Provided By Citrix Online

  • White Papers // May 2014

    IDC Report: Selecting the Optimal Path to Private Cloud

    Cloud computing models offer a new approach for IT organizations to deliver business services to end users. By implementing their own internal or "private" cloud infrastructures, IT organizations can deploy a technology model that provides both flexible IT architectures and dynamic business agility.It makes system resources accessible to applications that...

    Provided By EMC

  • White Papers // May 2014

    Deduplication solutions are not all created equal, why Data Domain?

    There is a common misconception that all deduplication systems are created the same and many organisations are doing their homework prior to making a purchase decision. There are certain key things to look for when you are researching a deduplication storage solution and that is the subject of this whitepaper....

    Provided By EMC

  • White Papers // May 2014

    The Forrester Wave™: File Sync and Share Platforms

    Consumerization Has Made File Sync And Share A Must-Have Capability The explosive proliferation of powerful mobile devices has led to employee demand for solutions that will allow seamless access to enterprise content from any device. Solutions like Dropbox, originally developed for consumer usage, have barged into the enterprise, forcing IT...

    Provided By EMC

  • White Papers // May 2014

    EMC Syncplicity: Simple and secure enterprise file sync and share with EMC Isilon

    While today’s consumer-oriented, cloud-based approaches to online file sharing offer flexibility and mobility for busy, on-the-go business users, many organizations have serious concerns about the reliability of the storage and security of data that is placed into cloud-based infrastructure that is managed by third party organizations. Providing business users with...

    Provided By EMC

  • White Papers // May 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

    Provided By Trend Micro

  • White Papers // May 2014

    Why a New Business Model is Needed for SSL Certificates

    The de facto Internet communication security protocol in use today is Secure Sockets Layer (SSL), used most commonly for browser-to-Web server communications, but increasingly for connections between applications when transferring critical business content.

    Provided By Trend Micro

  • White Papers // May 2014

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Provided By Trend Micro

  • White Papers // May 2014

    Chartis - The Risk Enabled Enterprise - Global Survey Results and Two-year Research Agenda

    This two year research initiative in collaboration with IBM focuses on key trends, best practices, challenges, and priorities in enterprise risk management and covers topics as diverse as culture, organizational structure, data, systems, and processes.

    Provided By IBM

  • White Papers // May 2014

    Deploying a big data solution using IBM GPFS

    Every day, the world creates 2.5 quintillion bytes of data and businesses are realizing tangible results from investments in big data analytics. IBM® General Parallel File System (GPFS™) offers an enterprise class alternative to Hadoop Distributed File System (HDFS) for building big data platforms and provides a range of enterprise-class...

    Provided By IBM

  • White Papers // May 2014

    IBM Storage with OpenStack Brings Simplicity and Robustness to Cloud

    While many storage vendors have submitted OpenStack drivers for their equipment, IBM has gone much further than that to support the OpenStack community. Read this paper and learn how.

    Provided By IBM

  • White Papers // May 2014

    IBM's New Ultra-dense, Hyper-Scale NeXtScale Server Environment

    IBM NeXtscale System is changing system design dynamics in the HPC marketplace with ultra-dense servers. Enterprises looking for raw computing power and throughput to handle technical computing, cloud, grid and analytics should evaluate this new ultra-dense, highly scalable systems design. Read the paper by Clabby Analytics to learn more.

    Provided By IBM

  • Webcasts // May 2014

    Make the Hybrid Cloud work for you

    Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics...

    Provided By IBM

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Provided By IBM

  • Downloads // May 2014

    IBM Platform LSF Evaluation/Download

    IBM Platform LSF is a powerful workload management platform for demanding, distributed HPC environments. It provides a comprehensive set of intelligent, policy-driven scheduling features that enable you to utilize all of your compute infrastructure resources and ensure optimal application performance.

    Provided By IBM

  • eBooks // May 2014

    Software Defined Storage for Dummies

    This book examines data storage and management challenges and explains software-defined storage, an innovative solution for high-performance, cost-effective storage using the IBM General Parallel File System (GPFS).

    Provided By IBM

  • Webcasts // May 2014

    Breakthrough "big data" storage solutions: IBM System x GPFS Storage Server

    This webcast short spotlights breakthrough “big data” storage solutions using IBM System x GPFS Storage Server -- a ground breaking, modular solution that can be optimized to balance client needs in terms of performance, capacity, cost and scale. This webcast short also shares capabilities in the broader IBM technical computing...

    Provided By IBM

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business. It was designed to serve as a primer in disaster management and preparation.

    Provided By Macquarie Telecom Australia

  • White Papers // May 2014

    Aberdeen Group Report: Improving Engagement with Multi-Channel Service

    In Aberdeen's Trends in Customer Service 2012: Multi-Channel Edition (November 2012), only 39% of organizations reported that they had been able to drive improvements in customer satisfaction over the previous 12 months. An even lower percentage indicated success in enabling higher rates of loyalty and retention. This is not a...

    Provided By LogMeIn

  • White Papers // May 2014

    Top 10 Endpoint Backup Mistakes

    The mobile workforce is rapidly obsoleting traditional backup strategies. Failure to adapt puts your data (and your job) at risk. Mistake #1: Not backing up laptops and mobile devices makes every device a ticking time bomb Mistake #7: Not picking the right deployment model could cost you...

    Provided By Druva Software

  • White Papers // May 2014

    A Survival Guide for Data in the Wild

    All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices—usually a laptop, a tablet, and a smartphone—that they use both inside and outside of the office. And outside the corporate firewall, it’s a wild world. With so...

    Provided By Druva Software

  • White Papers // May 2014

    Research report: Does Application Security Pay?

    Measuring the Business Impact of Software Security Assurance Solutions This research report will give you insights on how to manage information security and protect against cyber attacks. Read more in this research paper by Mainstay and learn how HP security solutions helped organisations in providing substantial operational and strategic benefits.

    Provided By HP US

  • White Papers // May 2014

    Business Whitepaper: Seven steps to software security

    A report that provides seven practical steps in securing applications. Find out how-by reading this report and prevent the damages a cyber attack brings.

    Provided By HP US

  • White Papers // May 2014

    HP whitepaper: Know the Big Three

    This white paper discusses the top three mobile application security threats facing businesses today. Read this report and learn some insights on how to mitigate the risks from security vulnerabilities.

    Provided By HP US

  • White Papers // May 2014

    Advanced Malware Protection Buyer's Guide

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    The Anatomy of the Internet of Things

    This article describes composition of the IOT. In order to manage risk you need to understand not only the applications, devices, or services under assessment, but also the other types of devices that will at some point certainly share parts of the underlying infrastructure of the IOT.

    Provided By Intel Corporation

  • White Papers // May 2014

    The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

    The proliferation of botnets reveal a worrisome trend in the spread and sophistication of computer viruses and worms in the Internet today. (A botnet is essentially a collection of compromised distributed computers or systems, known as bots because of their zombie-like nature, under the control of a bot-herder, by virtue...

    Provided By Intel Corporation

  • White Papers // May 2014

    The Emergence of Virtual Service Oriented Grids

    In the ever changing world of development and IT, understanding the possibilities new paradigms present and their capacity to change the way business is done is imperative. In much the same way the Internet changed business forever, virtual service oriented grid computing has the potential to force change once again....

    Provided By Intel Corporation

  • White Papers // May 2014

    Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance

    With application storage requirements growing at a tremendous rate, costs are skyrocketing while IT budgets are flat or declining. Today’s IT environments require storage solutions that have superior performance with lower initial and ongoing costs, along with high levels of integration between storage and application infrastructure to minimise onsite testing...

    Provided By Oracle

  • White Papers // May 2014

    Cloud Computing Basics

    In this article we go through some basic concepts with the purpose of providing context for the discussions in the chapters that follow. Here, we review briefly the concept of the cloud as defined by the U.S. National Institute of Standards and Technology, and the familiar terms of IaaS, PaaS,...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENCRYPTING THE INTERNET

    The evolution of the Internet has resulted in large quantities of information being exchanged by businesses or private individuals. The nature of this information is typically both public and private, and much of it is transmitted over the hyper text transfer protocol (HTTP) in an insecure manner. A small amount...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENHANCED DETECTION OF MALWARE

    A signifi cant development in the malware landscape in recent years is the ability of hackers to monetize compromised platforms by (1) gathering valuable information that can be sold, (2) using the platform’s resources to aid in an illicit or unwanted activity, or (3) holding information contained on the platform...

    Provided By Intel Corporation

  • White Papers // May 2014

    ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES

    Enhanced Privacy ID (EPID) is a cryptographic scheme that enables the remote authentication of a hardware device while preserving the privacy of the device owner. A hardware device with an EPID private key embedded can prove to a remote party that it is a valid device, certified by the hardware...

    Provided By Intel Corporation

  • White Papers // May 2014

    Introduction — The Internet of Things

    The Internet of Things (IOT) is about small machines in remote locations speaking to big centralized machines, often making decisions and taking action without people in the loop. It represents billions of devices speaking to each other, often managing outcomes in the physical environment. The IOT presents business opportunities in...

    Provided By Intel Corporation

  • White Papers // May 2014

    1 Platform Boot Integrity: Foundation for Trusted Compute Pools

    This article provides an introduction to the concept of roots of trust in a trusted computing platform, the measured boot process, and the attestation that are critical steps for ensuring boot integrity. It also provides an overview of Intel’s Trusted Executed Technology (TXT), an example of root of trust technology...

    Provided By Intel Corporation

  • White Papers // May 2014

    Implementation guide for a facilities management system

    Successful implementation of a facilities management system begins with a business case - and focuses on business goals as technology deployment proceeds. This guide addresses business goals in key facilities management areas and includes an overview of the software implementation process.

    Provided By IBM

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US