Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Downloads // Aug 2014

    Secure FTP Server Software for Managed File Transfer & File Sharing - Extremely Affordable & Easy-to-Use

    Serv-U® Managed File Transfer (MFT) Server from SolarWinds® is an easy-to-use FTP server software that delivers security, automation, and centralized control for file transfers in your organization. Deployed within your datacenter, Serv-U MFT Server allows you to securely transfer and share files with your business partners. Serv-U MFT Server supports...

    Sponsored By SolarWinds

  • White Papers // Aug 2014

    Announcing the New Intel Parallel Studio XE 2015

    Intel Parallel Studio XE 2015 is an advanced, comprehensive tool suite that simplifies debugging and tuning, and speeds development. Available in C, C ++, and FORTRAN. Speed time to market: Composer Edition: Includes industry-leading compilers and libraries that are optimized for creating fast parallel code. Professional Edition: Everything in...

    Sponsored By Intel Software

  • White Papers // Jun 2013

    Deliver Enterprise Mobility with Citrix XenMobile and Citrix Netscaler

    Mobile is the future. IT must ensure that the network infrastructure that supports mobile initiatives is flexible and scalable while delivering uncompromised performance and security. Mobility and the consumerisation of IT pose key challenges for IT around scalability, security and application visibility. Citrix solutions including Citrix XenMobile and Citrix NetScaler...

    Sponsored By Citrix

  • White Papers // May 2014

    Tyco Integrated Security: Overall Crime Index for Your Area

    This helpful and informative Crime Index shows detailed scores that indicate the relative risk of crime at a specific address or site listed as compared to national averages. A Crime Index score of 256 means that the risk of crime at the location is 2.56 times that of the national...

    Provided By Tyco

  • White Papers // Apr 2014

    Cloud Priorities 2014: Cloud strategies, priorities and implementation plans of North American IT leaders and professionals

    The ZDNet Cloud Priorities 2014 report, sponsored by Windstream, is a research study on cloud in North America and reports on the current and future adoption of the subject technology, the business objectives of adopters, and the experiences of those adopters. The report also covers current budgets and changes in...

    Provided By ZDNet

  • White Papers // Jan 2014

    Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Provided By IBM

  • Resource Center // Oct 2012

    Cloud RFP Template

    Public, private, and hybrid just begin to describe the type of cloud you may be looking for, but what about selecting a cloud provider? What criteria should you look for regarding their ability to deliver consistent performance, reliability and security? To help you gain an understanding of a cloud vendor's...

    Provided By SAVVIS

  • White Papers // Jan 2014

    Understanding the Economics of IT Risk and Reputation

    Which IT risks cause the most financial damage? What can you do now to address IT and reputational risk? A recent worldwide IBM study focused on understanding the financial and reputational consequences of IT failures. We set out to discover the elusive numbers that organizations need for building a business...

    Provided By IBM

  • Downloads // Jun 2009

    End-user password security

    Protecting your organization's important data starts with password security best practices. Use this Microsoft PowerPoint presentation to teach your users how to create strong passwords that are easy to remember.

    Provided By TechRepublic.com

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • Book chapters // Jul 2007

    Hack online games

    Online games, including World of Warcraft, EverQuest, Second Life, and online poker have taken the computer world by storm. In this chapter download from Exploiting Online Games: Cheating Massively Distributed Systems, explore the kinds of attacks and hacking techniques to which online games are vulnerable. By better understanding these...

    Provided By Addison Wesley Professional

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Provided By IBM

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Provided By IBM

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Sophisticated attacks WP

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you...

    Provided By IBM

  • White Papers // Nov 2013

    Signature Verification System Using MATLAB

    Signature continue to be an important biometric for authenticating the identity of human beings. This paper presents an effective method to perform Off-line signature verification using unique structural features extracted from the signature's contour. A novel combination of Modified Direction Feature (MDF) and additional distinguishing features such as the centroid,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Jul 2011

    Practical Real-Time Intrusion Detection Using Machine Learning Approaches

    The growing prevalence of network attacks is a well-known problem which can impact the availability, confidentiality, and integrity of critical information for both individuals and enterprises. In this paper, the authors propose a real-time intrusion detection approach using a supervised machine learning technique. Their approach is simple and efficient, and...

    Provided By Reed Elsevier

  • White Papers // Oct 2007

    Building a Better Network Access Control RFP: How to Get the Best Solution for Your Business

    This white paper seeks to simplify the RFP process for organizations seeking the network access control vendor that best suits their security needs. While requirements vary according to each organization's unique network infrastructure, user profile, and security expectations, some features are common to the most robust NAC solutions. Most notably,...

    Provided By Mirage Networks

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Provided By Dell Software

  • White Papers // Jul 2014

    Improving Wireless Connectivity For Your Users

    The ubiquity of mobile devices is a boon to productivity and a step forward for flexible work. But the huge influx of laptops, tablets, and smartphones on your business’s wireless LAN (WLAN) is creating new challenges. The move to mobility, propelled by the bring-your-own-device (BYOD) movement, can impact the performance...

    Provided By HP US

  • White Papers // Oct 2009

    Software Security Test Data Generation Based on Genetic Algorithms

    Software security is an important quality. The software security testing is one of the most important kinds of the software testing. How to test the software security, and especially to automatically generate security test cases are major problems. An improved method of the test data generation based on Genetic Algorithm...

    Provided By Academy Publisher

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • White Papers // May 2014

    Implementation guide for a facilities management system

    Successful implementation of a facilities management system begins with a business case - and focuses on business goals as technology deployment proceeds. This guide addresses business goals in key facilities management areas and includes an overview of the software implementation process.

    Provided By IBM

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Top 5 Reasons to Deploy Desktops as a Service

    No, the personal computer isn't dead, but it looks a whole lot different than it did just a few years ago. Even though organizations need to upgrade or replace many of their client systems, those physical units increasingly are being replaced by virtual machines. Desktops as a service (DaaS) may...

    Provided By Desktone

  • White Papers // May 2014

    Journey to the Hybrid Cloud

    Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a viable model for agile, cost-effective IT delivery. However, the prevailing binary paradigm of cloud infrastructure (public versus private) limits the extent to...

    Provided By VMware

  • White Papers // Jan 2014

    AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition

    IBM and AT&T have joined forces to create a compelling network-enabled private cloud offering that addresses security, performance and reliability -- concerns that have caused many large enterprises to put off migration to cloud. Read this analyst report to see just what this offering means to its target market: global...

    Provided By IBM

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // May 2014

    Microsoft Office 365 for the Enterprise

    Microsoft ventures into cloud services space for the first time in 13 years with Office 365. While this robust email and collaboration tool has many benefits as a hosted service, there are still enhancements that require a third party support. This whitepaper will explore the security, archiving and encryption capabilities...

    Provided By Mimecast

  • Downloads // Feb 2011

    Five tips for dealing with rootkits

    Rootkits are diverse, elusive, and difficult to get rid of. These basic pointers will help you combat this escalating threat.This download is also available as an entry in our Five Tips blog.

    Provided By Jack Wallen

  • Downloads // Mar 2011

    Six free tools for removing malicious software

    Many tools are available that will help you protect your desktops from malware -- and some of the best ones are free.This download is also available as an entry in our DIY IT Guy blog.

    Provided By Jack Wallen

  • White Papers // Aug 2008

    Best Practices in Video Surveillance Storage: A Guide for IT and Security Managers on the Reliable Storage of Surveillance Video

    This paper discusses video surveillance storage options, their evolution from DVRs and Network Video Recorders (NVRs) to Storage Area Networks (SANs). It also discusses the importance of selecting a storage system optimized for recording video from multiple cameras. The paper concludes by providing a paper on a solution using a...

    Provided By Milestone Systems

  • White Papers // Apr 2010

    Computer Crimes and Counter Measures in the Nigerian Banking Sector

    An increase in the use of the Information and Communication Technology (ICT) facilities such as computers and the Internet in the perpetration of criminal activities like spamming, credit card frauds, ATM frauds, phishing, identity theft, denial-of-service, and a host of others has lent credence to the view that ICT is...

    Provided By Obafemi Awolowo University

  • Downloads // Aug 2006

    10 ethical issues confronting IT managers

    Advances in technology, just like advances in any other area of endeavor, can generate societal changes that should cause us to reexamine our behavior. The dynamic nature of civilization means some components of ethical codes that were perfectly appropriate in previous generations may no longer apply. CIO Jeff Relkin...

    Provided By Jeff Relkin

  • White Papers // Aug 2011

    Building a Secure and Compliant Windows Desktop by Derek Melber, Microsoft MVP, MCSE, CISM

    Improving desktop security is a priority for nearly all companies. This is fueled by an increased recognition of the threat unsecured desktops pose, as well as a need to meet compliance regulations. However, most companies have struggled with implementing new security solutions. Removing administrator rights from end users when they...

    Provided By BeyondTrust