Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM: An Early Leader across the Big Data Security Analytics

    This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Case Studies // Jul 2013

    Equifax

    As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it...

    Sponsored By IBM

  • White Papers // Jun 2013

    Hybrid IT Service Management: A Requirement for Virtualization and Cloud Computing

    Many IT organizations are excited about the prospects of incorporating Cloud-based and virtual computing technologies into their present/future vision. At the same time, many of these same organizations have been educated and taken many steps on the road to IT service management maturity. But Cloud is a means to improved...

    Sponsored By frontrange

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Security For Virtualization, the challenge, the solution, and how to get the business on board

    Few of us would dispute that virtualization makes good business sense. However, the view of leading analysts is that in the rush to implement virtualization, security has become a poor second. So while the business benefits are clear, the risks are less well documented and understood. Selecting the right...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Defeating the Enemy of Complexity

    Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable? Download Kaspersky Lab’s new whitepaper,...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data Under Siege: Defend It with Encryption

    Is your cyber security doing enough to protect your new, hyper-mobile business practices? Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data Under Siege: Guard the Gaps with Patch Management

    Are you guarding the cybersecurity gaps with patch management? How often do your employees select "install" when they get a notification pop-up message and how often do they choose the "later" option? According to Kaspersky Lab research, more than 70 percent of users of the most vulnerable programs (Adobe...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Build Your IT Security Business Case

    The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments...

    Sponsored By Kaspersky Lab

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    Two-factor authentication is critical for safeguarding your company’s critical information. In this technical brief, discover five things to know before purchasing a two-factor authentication solution, and which solution is the best fit for your business.

    Sponsored By Dell Software

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • White Papers // Apr 2013

    Rethinking Your Enterprise Security: Critical Priorities to Consider

    In this informative white paper, explore the changing landscape of enterprise security. Learn why traditional security approaches fall short in the face of new and emerging workplace trends, and see how you can address critical security priorities - read on to learn more

    Sponsored By HP

  • White Papers // Apr 2013

    De-duplication appliances: Can HP put a dent in EMC’s hegemony?

    The early days of the de-duplication target market could be characterized as the Wild West according to 451 Research, with a slew of startups shooting it out in an emerging market with tremendous potential. That phase was followed by a consolidation phase where the big guns (most notably EMC and...

    Sponsored By HP & Intel® Xeon® Processor

  • Analyst Briefings // Apr 2013

    Datamation: Addressing the Top 4 Data Protection Pain Points Using Intelligent Backup and Deduplication

    In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Apr 2013

    HP StoreOnce: Boldly Go Where No Deduplication Has Gone Before

    Fast-growing data and widespread virtualization have ratcheted up data protection challenges no matter what the size of your business. This paper will describe the challenges of data protection, why deduplication is critical to meeting the challenges, how HP is achieving its vision of federated dedupe with StoreOnce – and what...

    Sponsored By HP & Intel® Xeon® Processor

  • Videos // Apr 2013

    Remote Office Data Protection with HP StoreOnce Catalyst

    Fastest disk backup and recovery in the industry. Fast—Meet shrinking backup windows and challenging RTO/RPO commitments; Flexible—Dedupe and replicate backup from anywhere to anywhere; Federated—Single deduplication engine deployed where you want with no need for data rehydration. The main reason for this is that HP has a single-product approach...

    Sponsored By HP & Intel® Xeon® Processor

  • Videos // Apr 2013

    Data Center Data Protection with HP StoreOnce Catalyst

    With the only federated deduplication solution available today, HP StoreOnce Backup with StoreOnce Catalyst overcomes the gaps, inefficiencies and costs associated with fragmented, first-generation deduplication technologies and delivers industry leading backup speeds. The main reason for this is that HP has a single-product approach to end-to-end de-duplication in its...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Apr 2013

    Automating and Securing Healthcare Information with Cloud-Based Fax Messaging

    Federal guidelines are driving healthcare providers to automate the processing of patient-related information. Using internal fax infrastructures to manage healthcare information is becoming more costly, and posing a security risk. Find out how a cloud-based fax solution secures patient information processing while lowering operational costs.

    Sponsored By OpenText

  • White Papers // Apr 2013

    Getting the Most Out of Your Next-Generation Firewall

    Network administrators are encountering the highest levels of change in history as they attempt to balance security with productivity. Rapidly evolving business trends are challenging them to provide widespread but safe Internet access, allowing employees to use legitimate business applications while using their device of choice. Applications have evolved to...

    Sponsored By Cisco

  • White Papers // Apr 2013

    Office 365 Single Sign-On: High Availability without High Complexity

    For most organizations, the move to Office 365 (O365) is a leap forward in user experience, productivity, it simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk can actually increase and productivity suffer. Learn why SSO for...

    Sponsored By Centrify

  • White Papers // Mar 2013

    Simple, cost-effective messaging and collaboration for medium-sized businesses.

    Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is designed to provide simplified solutions and delivery models based on your needs.

    Sponsored By IBM

  • White Papers // Mar 2013

    IDC Analyst Paper - Expert Integrated Systems: A Next Generation Computing Platform

    This white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform....

    Sponsored By IBM

  • White Papers // Mar 2013

    Systems with integrated expertise

    With expert integrated systems, you could consolidate workloads to reduce the total cost of ownership for your IT infrastructure. A new category of systems could help simplify your IT infrastructure, help you deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • White Papers // Mar 2013

    Businesses are ready for a new approach to IT

    With IBM PureSystems, you can consolidate workloads to reduce the total cost of ownership for your IT infrastructure. Simplify your IT infrastructure and reduce data center complexity. Deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Managing Access Security in a Multi-Perimeter World

    Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new integrated approach for securing the wide variety of enterprise and web resources from any device, any service and any source. Join IBM and...

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing identities and access in the cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation

    IBM commissioned Tolly to evaluate their protocol-based IBM Security Network Intrusion Prevention System GX7800 and compare its efficacy to that of a Snort-based device, a signature-based platform.

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile device environments

    In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...

    Sponsored By IBM

  • White Papers // Feb 2013

    Application security and risk management

    To address a very wide range of application risk, the IBM Security AppScan® portfolio integrates into application lifecycle management to identify risk, facilitate timely remediation and monitor the state of application security over time. The IBM Security AppScan portfolio includes solutions for both security teams and development organizations to...

    Sponsored By IBM

  • White Papers // Feb 2013

    Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.

    Sponsored By IBM

  • White Papers // Feb 2013

    How does IBM deliver cloud security?

    Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing cloud security concerns include: security of highly virtualized environments from...

    Sponsored By IBM

  • Case Studies // Feb 2013

    EXA Corporation creates a secure and resilient private cloud

    One of the primary reasons for slow adoption of cloud is the perceived challenge around security. For EXA Corporation, an integrated set of IBM cloud solutions for automation, security and management is enabling the company to create a secure, hybrid private cloud solution that combines proprietary and external data centers....

    Sponsored By IBM

  • White Papers // Feb 2013

    Ensuring application security in mobile environments

    As mobile device use in the workplace continues to increase rapidly, more organizations are placing mobile application security as a top security priority. For different types of mobile applications, there are many potential vulnerabilities attackers can exploit to gain access to sensitive data. Providing security for mobile applications requires the...

    Sponsored By IBM