Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Apr 2014

    Top 5 Reasons to Deploy Desktops as a Service

    No, the personal computer isn't dead, but it looks a whole lot different than it did just a few years ago. Even though organizations need to upgrade or replace many of their client systems, those physical units increasingly are being replaced by virtual machines. Desktops as a service (DaaS) may...

    Provided By Desktone

  • White Papers // May 2014

    Journey to the Hybrid Cloud

    Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a viable model for agile, cost-effective IT delivery. However, the prevailing binary paradigm of cloud infrastructure (public versus private) limits the extent to...

    Provided By VMware

  • White Papers // Jan 2014

    AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition

    IBM and AT&T have joined forces to create a compelling network-enabled private cloud offering that addresses security, performance and reliability -- concerns that have caused many large enterprises to put off migration to cloud. Read this analyst report to see just what this offering means to its target market: global...

    Provided By IBM

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // May 2014

    Microsoft Office 365 for the Enterprise

    Microsoft ventures into cloud services space for the first time in 13 years with Office 365. While this robust email and collaboration tool has many benefits as a hosted service, there are still enhancements that require a third party support. This whitepaper will explore the security, archiving and encryption capabilities...

    Provided By Mimecast

  • Downloads // Feb 2011

    Five tips for dealing with rootkits

    Rootkits are diverse, elusive, and difficult to get rid of. These basic pointers will help you combat this escalating threat.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Downloads // Mar 2011

    Six free tools for removing malicious software

    Many tools are available that will help you protect your desktops from malware -- and some of the best ones are free.This download is also available as an entry in our DIY IT Guy blog.

    Provided By Jack Wallen

  • White Papers // Aug 2008

    Best Practices in Video Surveillance Storage: A Guide for IT and Security Managers on the Reliable Storage of Surveillance Video

    This paper discusses video surveillance storage options, their evolution from DVRs and Network Video Recorders (NVRs) to Storage Area Networks (SANs). It also discusses the importance of selecting a storage system optimized for recording video from multiple cameras. The paper concludes by providing a paper on a solution using a...

    Provided By Milestone Systems

  • White Papers // Apr 2010

    Computer Crimes and Counter Measures in the Nigerian Banking Sector

    An increase in the use of the Information and Communication Technology (ICT) facilities such as computers and the Internet in the perpetration of criminal activities like spamming, credit card frauds, ATM frauds, phishing, identity theft, denial-of-service, and a host of others has lent credence to the view that ICT is...

    Provided By Obafemi Awolowo University

  • Downloads // Aug 2006

    10 ethical issues confronting IT managers

    Advances in technology, just like advances in any other area of endeavor, can generate societal changes that should cause us to reexamine our behavior. The dynamic nature of civilization means some components of ethical codes that were perfectly appropriate in previous generations may no longer apply. CIO Jeff Relkin...

    Provided By Jeff Relkin

  • White Papers // Aug 2011

    Building a Secure and Compliant Windows Desktop by Derek Melber, Microsoft MVP, MCSE, CISM

    Improving desktop security is a priority for nearly all companies. This is fueled by an increased recognition of the threat unsecured desktops pose, as well as a need to meet compliance regulations. However, most companies have struggled with implementing new security solutions. Removing administrator rights from end users when they...

    Provided By BeyondTrust

  • Downloads // Dec 2010

    10 free anti-malware tools worth checking out

    The cost of anti-malware apps keeps rising. Luckily, there are effective tools you can use to prevent and remove infections without spending a dime.This download is also available as an entry in our 10 Things blog.

    Provided By Brien Posey

  • Downloads // Mar 2010

    How do I clone a hard drive with Clonezilla?

    With Clonezilla you can clone a single drive or even a single partition within a drive and then recover that drive later. Jack Wallen shows you how.

    Provided By Jack Wallen

  • Downloads // Jul 2008

    Track a user's Internet Explorer History with IEHistoryView

    Tracking a user's browsing history can be both an expensive and a daunting task, especially if you're a one-man shop in a small company. IEHistoryView from NirSoft is a simple, yet powerful, tool you can use to quickly see a user's browsing history. This download is also available as an...

    Provided By Wally Bahny

  • White Papers // Oct 2006

    A Java Based Network Intrusion Detection System (IDS)

    The number of hacking and intrusion incidents is increasing alarmingly each year as new technology rolls out. Unfortunately in today's digitally connected world, there is no place to hide. DNS, NSlookup, Newsgroups, web site trawling, e-mail properties etc. are just some of the many ways in which one can be...

    Provided By Andhra University

  • White Papers // May 2011

    Authentication Schemes for Session Passwords Using Color and Images

    Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...

    Provided By Andhra University

  • White Papers // Jul 2013

    Essential IPAM Vol 1: TCP/IP Networking

    This article examines TCP/IP networking with an emphasis on protocol layers and the interactions of these layers. Specifically this paper will provide an overview of: Networking Models IP Addressing IP Packets and IP Routing The Transport Layer, UDP and TCP

    Provided By SolarWinds

  • White Papers // Feb 2014

    2013 Cost of Cyber Crime Study: Global Report

    In all countries, business disruptions and information loss or theft are the most significant consequence of a cyber attack. Organizations need to be more vigilant in protecting their most sensitive and confidential information. This report by the Ponemon Institute is based on a representative sample of 234 organizations in the...

    Provided By HP US

  • White Papers // Apr 2014

    Forrester report: Measuring Mobile Apps

    A new Forrester report says developers need to improve their mobile measurement savvy. Get a fresh perspective on the importance of metrics and monitoring. Read the report and discover the value of applications performance measurement.

    Provided By HP US

  • White Papers // May 2014

    HP whitepaper: Know the Big Three

    This white paper discusses the top three mobile application security threats facing businesses today. Read this report and learn some insights on how to mitigate the risks from security vulnerabilities.

    Provided By HP US

  • Downloads // Jan 2007

    Use this template to configure a Cisco PIX Firewall

    Configuring a new Cisco PIX Firewall can be challenging and time-consuming. Why not automate the process with an Excel template? As a companion download to David Davis' article, "Configure a Cisco PIX Firewall with this template," this Excel workbook will generate the appropriate configuration for the firewall. All...

    Provided By David Davis

  • White Papers // Jun 2010

    Online Banking: Threats and Countermeasures

    Use of online banking is rapidly increasing as 370 million users' banks online across the globe. However, the increased use of online banking is accompanied by rapidly growing fraud incidents. For example, in 2008 England suffered online banking fraud losses that amounted to ?53 million, and the U.S. had hundreds...

    Provided By AhnLab

  • White Papers // Aug 2007

    PCI DSS and HIPAA: The Security Standards Share Common Ground

    One of the greatest challenges that the electronic transactions industry faces today is the issue of security requirements under various rules and regulations. For most people in the industry, the issue is focused on the specifics of the Payment Card Industry Data Security Standard (PCI DSS), but the issue may...

    Provided By CSRSI

  • Downloads // Aug 2011

    Android security test app

    It's estimated that more than half of all Android phones are operating with a security flaw that allow applications to enable GPS, Wi-Fi, and Bluetooth without the user's permission. This app will test your phone to see if it's one of them.

    Provided By Michael Kassner

  • Tools & Templates // Dec 2007

    A General Non-Disclosure Agreement For A Specific Project

    A Non-Disclosure Agreement (NDA) is a legal contract between at least two parties that outlines confidential materials or knowledge the parties wish to share with one another for certain purposes, but wish to restrict from generalized use. In other words, it is a contract through which the parties agree not...

    Provided By Home Business Online

  • White Papers // Jan 2014

    The 2014 Firewall Buyers Guide

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: The fundamentals of modern firewall technology The ten critical business requirements your next firewall needs to address Information on how to create a vendor request...

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Mar 2011

    Fingerprint Recognition With Embedded Cameras on Mobile Phones

    Mobile phones with a camera function are capable of capturing image and processing tasks. Fingerprint recognition has been used in many different applications where high security is required. A first step towards a novel biometric authentication approach applying cell phone cameras capturing fingerprint images as biometric traits is proposed. The...

    Provided By Gjøvik University College

  • White Papers // Sep 2012

    Image Encryption Using Chaos Theory

    Image encryption is not a very developed field yet plays a role in a number of vital industries. Most Image based encryptions use Block Algorithms like DES, which are suitable for Text Encryption. These algorithms if implemented for image are vulnerable to statistical attacks. In this paper, the authors introduce...

    Provided By EuroJournals

  • White Papers // Jun 2014

    Data Privacy - the High Cost of Unprotected Sensitive Data

    The collection and use of Personally Identifiable Information (PII) is exploding. With this expansion, there is increasing pressure from individuals, industry regulators, and lawmakers for organizations to protect sensitive data from hacker attacks and insider abuse or theft. The six steps outlined in this paper illustrate the challenges around the...

    Provided By Imperva

  • White Papers // Mar 2013

    Home Automation and Security System Using Android ADK

    Home automation is automation of the home, housework or household activity. Home automation may include centralized control of lighting, HVAC (Heating, Ventilation and Air Conditioning), appliances, and other systems, to provide improved convenience, comfort, energy efficiency and security. The concept of home automation has been around for a long time...

    Provided By Creative Commons

  • White Papers // Nov 2012

    Improving Mobile Device Security and Management with Active Directory

    As more and more workers bring personal devices to work for increased productivity and mobile access organizations must quickly respond to the security and compliance risks posed by largely unmanaged access to corporate information. Enterprises can expect to see tablet sales alone increase by 250% in 2012, primarily iPads, which...

    Provided By Centrify

  • White Papers // Mar 2012

    On Optimal Artificial-Noise Assisted Secure Beamforming for the Multiple-Input Multiple-Output Fading Eavesdropper Channel

    In a wiretap channel, a source node wishes to transmit confidential messages securely to a legitimate receiver and to keep the eavesdropper as ignorant of the message as possible. As a special case of the broadcast channels with confidential messages, Wyner characterized the secrecy capacity of the discrete memoryless wiretap...

    Provided By National Taiwan University

  • White Papers // Jun 2014

    Protect Against Advanced Evasion Techniques

    The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). The risk of network security systems being compromised by AETs continues to grow as more and more...

    Provided By McAfee

  • Downloads // Jul 2010

    Welcome to the CDW Security Assessment

    Network security is critical to organizations of all sizes and across all industries. The CDW Security Assessment can help you: Measure your network security against that of your peers Understand how various security threats can affect your organization Identify your potential vulnerabilities and learn how to address them

    Provided By CDW

  • Podcasts // Oct 2013

    Companies Grow More with Oracle Sales Cloud

    Animated Video: Oracle Sales Cloud is Smarter SFA that helps Companies Grow More. Maximize revenue and optimize sales performance. Know what to sell your customers. And get more help from your marketers and partners.

    Provided By Oracle

  • White Papers // May 2014

    Tyco Integrated Security: National Crime Infographic

    This helpful and valuable infographics shows the crime trends across the United States and how Tyco Integrated Security helps real world companies achieve their security and business goals. This demonstrates how safe is your business really is by illustrating crime trends and statistics from across the United States that business...

    Provided By Tyco

  • White Papers // Apr 2014

    FlexPod Infrastructure Guide for 2014

    This informative paper explores how one company easily and affordably implemented a data storage operating system that provides nondisruptive operations, proven efficiency, seamless scalability and much more. Read on to learn more.

    Provided By NetApp

  • White Papers // Sep 2008

    Deploying and Managing Thin Clients

    This white paper has reviewed some of the considerations for a large-scale thin client deployment program and discussed how to design and manage a thin client computing infrastructure with Wyse Device Manager, (WDM). This has shown that while thin client management may appear straightforward at the outset, a sophisticated management...

    Provided By Wyse Technology

  • White Papers // Jan 2001

    Seven Steps to Digital Signature Implementation

    According to an Aberdeen Group market survey, 98% of the Global 2000 organizations will be using a Public Key Infrastructure (PKI) before 2003 for business-to-business electronic commerce and Internet based financial applications. This explosive growth of public key infrastructure combined with recent ?E-Sign? (Electronic Signature in Global and National Commerce...

    Provided By Gradkell Systems