Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Aug 2013

    Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    iPads and iPhones have emerged as powerful and secure mobile platforms for corporate, academic and government organizations. The problem? When using 4G/3G hotspots, mobile devices must support VPN connectivity to ensure security; however,when inside corporate networks, mobile devices should be able to take advantage of the security offered by next-generation...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Organizations today are grappling with the double-edged sword that is mobility. Smartphones, tablets and laptops are not only conduits of greater access and information flow, but can also serve as a vehicle for malware and other security threats. Companies that rely strictly on Remote Desktop Protocol (RDP) solutions are more...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Wild World of Malware: Keeping your Company Safe Inside

    As the level of cyber-crimes continues to grow, it’s important for IT to understand the latest types of malware and how they work. This is especially true for small- and medium-sized businesses that don’t have the resources to concentrate on network security. Find out how to protect your...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    EMC VSPEX for Rapid ROI

    Many organizations are struggling to embrace new innovative solutions that provide strategic value to the business. These challenges are exacerbated for small and midsized businesses (SMBs) with fewer resources than their midmarket and enterprise counterparts. This analytical report looks into how organizations are looking into new technologies to see greater...

    Sponsored By EMC

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Aug 2013

    EMC IT - Leading The Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs—while still important—is no longer the top priority. This...

    Sponsored By EMC

  • White Papers // Aug 2013

    A Prescription for IT Efficiency

    Ever-growing concerns over hospital and patient security should incite IT professionals in the healthcare sector to focus on reducing risk. Because of its age, Windows XP poses a measurable security risk on every desktop where it’s still deployed. A timely move to modern Windows brings with it enhanced security, faster...

    Sponsored By Dell & Microsoft

  • White Papers // Aug 2013

    Monitoring Performance in SAP environments

    With a range of critical business systems running on your SAP environment, ensuring optimal performance is essential for business efficiency and customer satisfaction. This white paper evaluates the challenges associated with monitoring the performance of SAP environments and provides key recommendations for ensuring reliable service delivery: Top SAP monitoring...

    Sponsored By CA Technologies

  • White Papers // Aug 2013

    University of Miami Prevents Data Loss with Robust Data Protection Solution

    Business need In transitioning to a VMware®-centric environment, the University of Miami needed a single, scalable solution for protecting 213TB of sensitive data, including important medical research data, across an ever-growing number of VMware guests. Solution With Dell™ vRanger data protection software, the university transitioned to a VMware environment...

    Sponsored By Dell

  • White Papers // Jul 2013

    2013 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • White Papers // Jul 2013

    2013 Gartner Critical Capabilities for SIEM

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM Security AppScan 8.7 Adds Support for iOS Mobile Apps

    With the introduction of AppScan 8.7, IBM introduces one of the first application security products to answer the enterprise’s pressing need for iOS application security tooling and end-to-end integration with iOS application platforms, from the mobile device and endpoint functionality to server-side concerns, with an approach that also addresses the...

    Sponsored By IBM

  • White Papers // Jul 2013

    IBM: An Early Leader across the Big Data Security Analytics

    This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one...

    Sponsored By IBM

  • White Papers // Jul 2013

    When It Makes Sense to Move to Desktop Virtualization: Seven Key Indicators

    Is it time to migrate from a traditional, phsyical endpoint environment to virtual desktop infrastructure? From security and compliance requirements to BYOD end-user access demands, read this whitepaper to see if these indicators for desktop virtualization apply to your business.

    Sponsored By VMware

  • eBooks // Jul 2013

    Real World Considerations for Implementing Desktop Virtualization eBook

    Are you considering extending the success of your server virtualization deployment to your desktops? Read this comprehensive eBook for introductory information on virtual desktop infrastructure (VDI), including the pros and cons of VDI, as well how to ensure a successful implementation.

    Sponsored By VMware

  • White Papers // Jul 2013

    IBM Security Intrusion Preventions Solutions

    As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell-code to exploit new vulnerabilities. Responding to these challenges, IBM Security offers...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • Case Studies // Jul 2013

    Equifax

    As a global leader in information solutions, Equifax holds one of the largest stores of consumer and commercial data—income data, unemployment data, asset and wealth data, property data, credit scores, and much more. As a result, security is of paramount importance to both Equifax and the people and organizations it...

    Sponsored By IBM

  • White Papers // Jun 2013

    Hybrid IT Service Management: A Requirement for Virtualization and Cloud Computing

    Many IT organizations are excited about the prospects of incorporating Cloud-based and virtual computing technologies into their present/future vision. At the same time, many of these same organizations have been educated and taken many steps on the road to IT service management maturity. But Cloud is a means to improved...

    Sponsored By frontrange

  • White Papers // Jun 2013

    Why Complexity Is IT Security’s Worst Enemy

    Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothing new, the fact remains that IT is arguably the key department tasked with supporting these needs and ultimately making this...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Security For Virtualization, the challenge, the solution, and how to get the business on board

    Few of us would dispute that virtualization makes good business sense. However, the view of leading analysts is that in the rush to implement virtualization, security has become a poor second. So while the business benefits are clear, the risks are less well documented and understood. Selecting the right...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Defeating the Enemy of Complexity

    Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable? Download Kaspersky Lab’s new whitepaper,...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data under Siege: Protection in the Age of BYODs

    You would be hard pressed to find a single employee who comes to the office without a personal mobile device. Most probably use those devices outside the office to send work-related email messages. BYOD is a reality in today's business world. Is your IT department a roadblock that employees go...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data Under Siege: Defend It with Encryption

    Is your cyber security doing enough to protect your new, hyper-mobile business practices? Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Your Data Under Siege: Guard the Gaps with Patch Management

    Are you guarding the cybersecurity gaps with patch management? How often do your employees select "install" when they get a notification pop-up message and how often do they choose the "later" option? According to Kaspersky Lab research, more than 70 percent of users of the most vulnerable programs (Adobe...

    Sponsored By Kaspersky Lab

  • White Papers // Jun 2013

    Build Your IT Security Business Case

    The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments...

    Sponsored By Kaspersky Lab

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    Two-factor authentication is critical for safeguarding your company’s critical information. In this technical brief, discover five things to know before purchasing a two-factor authentication solution, and which solution is the best fit for your business.

    Sponsored By Dell Software

  • White Papers // Apr 2013

    The future of email and application is social.

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

    Sponsored By IBM

  • White Papers // Apr 2013

    Rethinking Your Enterprise Security: Critical Priorities to Consider

    In this informative white paper, explore the changing landscape of enterprise security. Learn why traditional security approaches fall short in the face of new and emerging workplace trends, and see how you can address critical security priorities - read on to learn more

    Sponsored By HP

  • White Papers // Apr 2013

    De-duplication appliances: Can HP put a dent in EMC’s hegemony?

    The early days of the de-duplication target market could be characterized as the Wild West according to 451 Research, with a slew of startups shooting it out in an emerging market with tremendous potential. That phase was followed by a consolidation phase where the big guns (most notably EMC and...

    Sponsored By HP & Intel® Xeon® Processor

  • Analyst Briefings // Apr 2013

    Datamation: Addressing the Top 4 Data Protection Pain Points Using Intelligent Backup and Deduplication

    In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Apr 2013

    HP StoreOnce: Boldly Go Where No Deduplication Has Gone Before

    Fast-growing data and widespread virtualization have ratcheted up data protection challenges no matter what the size of your business. This paper will describe the challenges of data protection, why deduplication is critical to meeting the challenges, how HP is achieving its vision of federated dedupe with StoreOnce – and what...

    Sponsored By HP & Intel® Xeon® Processor

  • Videos // Apr 2013

    Remote Office Data Protection with HP StoreOnce Catalyst

    Fastest disk backup and recovery in the industry. Fast—Meet shrinking backup windows and challenging RTO/RPO commitments; Flexible—Dedupe and replicate backup from anywhere to anywhere; Federated—Single deduplication engine deployed where you want with no need for data rehydration. The main reason for this is that HP has a single-product approach...

    Sponsored By HP & Intel® Xeon® Processor