Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security - Part 1: Monitoring

    Companies are protecting themselves from high-profile threats such as malware attacks, but are often leaving themselves vulnerable from the 'forgotten security defences'. The first of these results from simply not monitoring the applications, hardware and security systems across the business, which can lead to network failure. Most businesses are using...

    Provided By Network Box

  • Case Studies // Sep 2009

    Albuquerque Schools Improve Performance, Reliability and Security With 3Com Enterprise Networking Solutions

    Albuquerque Public Schools (APS) in New Mexico, one of the largest school districts in the nation, provides services to approximately 90,000 students and 15,000 faculty and staff throughout the city. APS needed a robust, high-performance network infrastructure and expanded wireless connectivity to keep up with growing numbers of students and...

    Provided By 3Com

  • Case Studies // Sep 2009

    iStreet Delivers Reliable, Cost-Effective Enterprise SAP Hosting Using NetApp Storage

    With so much riding on its services, iStreet constantly strives to improve quality, reliability, and cost-effectiveness for clients. iStreet wanted to improve service reliability and cost. The challenge was to exceed service-level agreements and reduce IT overhead. iStreet delivered Software as a Service (SaaS) built on a NetApp storage infrastructure....

    Provided By NetApp

  • Case Studies // Sep 2009

    SonicWALL Case Study: The Cimarron Group

    This case study highlights the successful deployment of a SonicWALL Network Security Appliance (NSA) 3500 solution at The Cimarron Group (Cimarron), a Hollywood-based entertainment marketing company specializing in producing and developing promotional campaigns for major motion picture releases, including television commercials, movie trailers, and movie posters. SonicWALL spoke with Mark...

    Provided By SonicWALL

  • White Papers // Sep 2009

    Effective Information Security: A Win-Win Proposition for the Enterprise and IT

    Driven by an accelerated increase in identity theft, consumer fraud, and other personal information - related thefts, industry groups and federal and state governments have taken aggressive steps to hold companies and their management accountable for confidential information disclosures. Similarly, enterprises are facing significant challenges in preventing the theft or...

    Provided By CA

  • White Papers // Sep 2009

    Design Security in Stratix III Devices

    As FPGAs are increasingly used for critical system functions, protecting designs and Intellectual Property (IP) implemented inside FPGAs is becoming more important. Altera Stratix III devices are the first high-density and high-performance FPGAs to use the Advanced Encryption Standard (AES) with both non-volatile and volatile key programming to protect designs...

    Provided By Altera

  • White Papers // Sep 2009

    What's New in Oracle Data Provider for .NET 11.1.0.7.20

    Oracle Data Provider for .NET (ODP.NET) is a native ADO.NET data access driver for Oracle databases. ODP.NET 11.1.0.7.20 introduces new features to improve ease of development, application scalability, performance, security, and manageability. This release exposes unique Oracle database functionality, which .NET developers can now use more easily, and improves Oracle...

    Provided By Oracle

  • White Papers // Sep 2009

    Security and Acceleration - The Sweet Spot of Application Delivery

    F5's unified web application security and acceleration in BIG-IPv10 offers an unmatched solution for directing, securing, and accelerating web applications. Retail and remote users receive faster web pages. For IT, it minimizes WAN bandwidth utilization, safeguards web applications, and prevents data leakage, all while directing traffic to the application server...

    Provided By F5 Networks

  • White Papers // Sep 2009

    Security Among the Clouds

    Unlike many technologies, cloud computing has evolved in response to customer needs for better, faster, and cheaper methods of managing information technology. Indeed, individual customer demand defines the level of services, applications, storage, and availability that the cloud delivers. Technology rarely evolves based purely on customer needs, but cloud computing...

    Provided By PricewaterhouseCoopers

  • White Papers // Sep 2009

    Questions To Ask When Leasing Office Space

    If you've started your own business, and are starting to see promising returns on your investment, it may seem like your spare bedroom or basement office space is no longer meeting your needs. If you've found yourself wishing for a conference room in which to meet with clients, or a...

    Provided By Associated Content

  • White Papers // Sep 2009

    Today's Blended Threats: Identifying and Stopping the Growing Problem of Web-Based Attacks

    Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers, motivated by financial gain, are constantly inventing new ways to penetrate corporate defenses and access valuable data. Their tools include new zero-day attacks, targeted threats, use of mass variant attacks and now, blended threats delivered via...

    Provided By M86 Security

  • Case Studies // Sep 2009

    SonicWALL Case Study: Total Transit, Inc.

    Founded in 1984, Total Transit, Inc. is the Phoenix's largest taxi service, operating over 500 vehicles with its division of Discount Cab. The challenge was to ease teleworker access to virtual call center system and streamlines IT administration of the virtual private network access. Total Transit deployed SonicWALL SSL-VPN 2000.

    Provided By SonicWALL

  • White Papers // Sep 2009

    Category-Based Selection of Effective Parameters for Intrusion Detection

    Existing intrusion detection techniques emphasize on building intrusion detection model based on all features provided. In feature-based intrusion detection, some selected features may found to be redundant and useless. Feature selection can reduce the computation power requirements and model complexity. This paper proposes a category-based selection of effective parameters for...

    Provided By Iran University of Science and Technology

  • White Papers // Sep 2009

    Biometric Authentication: A Review

    Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs...

    Provided By Hannam university

  • White Papers // Sep 2009

    The Microsoft Dynamics CRM Security Model

    Designed to protect data integrity and privacy and to support efficient data access and collaboration, the Microsoft Dynamics CRM 4.0 security model: supports a licensing model for users. Provides users with access only to the information that they require to do their jobs, categorizes types of users by role and...

    Provided By Microsoft

  • White Papers // Sep 2009

    Understanding Security in Microsoft Dynamics AX 2009

    Microsoft Dynamics AX 2009 provides three methods for controlling access to features within the AX client. These include: license keys, configuration keys, and security keys. These methods each control a different range of items, from an entire feature set to something as specific as a field on a form. Another...

    Provided By Microsoft

  • White Papers // Sep 2009

    The Evolution of Strong Authentication

    Strong authentication technologies have long been used for providing an extra layer of assurance that an individual accessing computing resources is who they say they are. However, the cost of deploying and managing such systems, including the provisioning of hardware tokens and the strain on helpdesk resources dealing with lost...

    Provided By Quocirca

  • White Papers // Sep 2009

    Towards a More Social Perspective of Network Management: An Action Research Study on Trust and Commitment

    This paper focuses on network management. The paper highlights the social perspective of network management and presents an action research study on creating, maintaining and restoring trust and commitment in a network. Through theoretical review and empirical findings, the paper discusses how trust can be divided into initial and evolved...

    Provided By Helsinki School of Economics

  • White Papers // Sep 2009

    Confidence Is An Inside Job

    The Coast Guard recently played host to Authentic Leadership Institute (ALI) President Nick Craig, who spent a week on the Coast Guard's USCGC Eagle. A 300-foot tall ship, the Eagle has 56 crew members and 141 trainees, most between the ages of 20 and 22. They spend considerable time at...

    Provided By University of Pennsylvania (Wharton)

  • White Papers // Sep 2009

    The Case for a New Benchmark Testing Methodology

    An expanded method for testing AV products is described and demonstrated. The proposed method expands AV product protection scoring from malware file detection rates to include credit for blocking access to the URLs that serve downloaded malware files. This expansion is required because AV vendors have responded to the vast...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Ghosts in the Machine: Today's Invisible Threats

    Viruses are invisible without a microscope, yet remain one of the most deadly organisms that exist in nature. The term "Computer Virus" is aptly named to describe one of the greatest challenges of the online world. Yesterday's computer viruses were not invisible and were instead created by "Showoff" hackers out...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Quantifying the Business Value of VMware View

    IDC performed an in-depth analysis for this white paper, providing a quantitative measurement of the business value, defined as the expected ROI, associated with the use of VMware View as a platform for the targeted deployment of a centralized virtual desktop architecture. It further provides a quantification of the value...

    Provided By VMware

  • White Papers // Sep 2009

    ENCRYPTOKEY: The Ultimate VPN Solution

    This white paper addresses the attributes and capacities of a revolutionary new approach to complete network security through the application of the ENCRYPTOKEY VPN. The ENCRYPTOKEY VPN solution is a crypto-analytically secure network operating system, which facilitates users' ability to create communications as if they were on the same closed...

    Provided By Sky Catcher Solutions

  • White Papers // Sep 2009

    Microsoft Unified Communications and Boldon James Secure Information Exchange: Key Solutions for Defense, Public Safety and Government

    Microsoft and Boldon James, the Go-To-Market partner for Secured Unified Communications in the Public Safety and National Security market, have a long history of involvement in supporting the needs of today's defense forces. Due to advances in technology, Boldon James applications - once exclusively for the military - are now...

    Provided By Microsoft

  • White Papers // Sep 2009

    Trend Micro Web Gateway Security

    As the web becomes more important to modern business, it also becomes more dangerous. A new malware threat is created every two seconds, and cybercriminals are better organized to deliver increasing numbers of sophisticated web-borne threats. URL filtering alone at the Internet gateway is insufficient to protect organizations from threats...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails

    Spam filters that are implemented using Na?ve Bayesian learning techniques are widely deployed worldwide with email clients such as Outlook. These filters that are deployed on end user's computers and typically used to filter out spam for individual users are effective when the spam load is around 400-500 spam emails...

    Provided By University at Buffalo

  • Webcasts // Sep 2009

    Getting the Most Performance Out of Your Security Appliance

    Network security environments are growing in complexity with evolving Internet traffic patterns and fast proliferation of security threats. The need to maintain consistent performance while addressing evolving traffic patterns and threats is paramount. The attendee will learn how the next generation security appliance delivers consistent performance without sacrificing network security.

    Provided By Check Point Software Technologies

  • White Papers // Sep 2009

    Data Mining With Oracle Database 11g Release 2: Competing on In-Database Analytics

    With Oracle Data Mining, everything occurs in the Oracle Database-in a single, secure, scalable platform for advanced business intelligence. Oracle Data Mining represents a breakthrough in business intelligence. It embeds a wide-range of mining functions inside the database with power of SQL. It helps clients to target best customers, develop...

    Provided By Oracle

  • White Papers // Sep 2009

    The Cloud or the Mist?

    This paper will discuss the potential security risks of storing information in the cloud with respect to malware. It will explore whether malware can infiltrate the cloud, what effects it can have, and what can be done to fight it. It will also delve into social engineering techniques that have...

    Provided By Microsoft

  • Webcasts // Sep 2009

    Discover the Difference: Adobe® Connect™ vs WebEx

    Watch this 30 minute session to discover the difference between Adobe Connect for online meetings and training compared to Cisco's WebEx.

    Provided By Adobe Systems

  • Case Studies // Sep 2009

    HP Works With Jintian Group to Build SAP ERP System Information Platform

    Ningbo Jintian Copper (Group) Co. Ltd established in October 1986, is one of the top 500 enterprises mainly specialized in copper processing and grows to the largest copper manufacturer. Ningbo Jintian Copper (Group) Co. wanted to establish an efficient information platform and uniformly integrated business platform, capable of supporting production,...

    Provided By Hewlett-Packard (HP)

  • Case Studies // Sep 2009

    Government Increased Responsiveness by Filtering Unwanted Mail

    The Flemish Government oversees the education, culture, health care, and international development of the Flemish community in Belgium. With more than six million people living in the area, the Flemish Government strives to maintain the world's highest living standard for all residents. Flemish Government wanted to reduce spam and increase...

    Provided By Hewlett-Packard (HP)

  • Case Studies // Sep 2009

    Prison Service Reduced Costs, Improved Service and Gained Nearly $191 Million in Benefits

    HMPS serves the public by maintaining custody of those committed by the courts. It rehabilitates offenders and helps them lead law-abiding, productive lives while in custody and upon re-entering society. HMPS wanted to reduce costs and improve the efficiency of its finance, human resources and procurement systems, while ensuring higher...

    Provided By Hewlett-Packard (HP)

  • White Papers // Sep 2009

    Poor Quality International Data: The Pandemic Problem That Needs Addressing

    This paper discusses about predicaments caused and bad effects of poor quality in international data. The internet is imperative means of communication. The predicament is poor quality of international data. It is rare scenario that a specific file consists of US addresses with globalized trading and file assembling through internet...

    Provided By Postcode Anywhere

  • White Papers // Sep 2009

    Open Standards-Based System Integration for Asset Management Decision Support

    Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions - as a new integration scenario requirement arises, a custom solution is built between the relevant systems. Bus-based solutions are now preferred, whereby...

    Provided By Queensland University of Technology

  • White Papers // Sep 2009

    Red Hat Enterprise Linux Security

    Computing security has never been more important. Increasing regulations, differing requirements from international locales, and sophisticated attacks all contribute to serious challenges that call for thorough solutions. Red Hat has deep security experience, and provides the technology and consulting that one require. Comprehensive security not only covers a broad range...

    Provided By Red Hat

  • White Papers // Sep 2009

    Communications Management

    Learn how to engage customers and reduce costs by automating the generation of personalized electronic and paper documents. This paper discusses how Adobe LiveCycle Solutions for communications management helps address several challenges facing enterprises today, from catering to individual preferences to protecting the integrity and confidentiality of data to...

    Provided By Adobe Systems

  • White Papers // Sep 2009

    System and Network Security Acronyms and Abbreviations

    This paper contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for federal agencies and other users of system and network security publications. The capitalization, spelling, and definitions of acronyms and abbreviations...

    Provided By National Institute of Standards and Technology

  • White Papers // Sep 2009

    Online Learning in Biometrics: A Case Study in Face Classifier Update

    In large scale applications, hundreds of new subjects may be regularly enrolled in a biometric system. To account for the variations in data distribution caused by these new enrollments, biometric systems require regular re-training which usually results in a very large computational overhead. This paper formally introduces the concept of...

    Provided By West Virginia University

  • White Papers // Sep 2009

    Exploiting the "Doddington Zoo" Effect in Biometric Fusion

    Recent research in biometrics has suggested the existence of the "Biometric Menagerie" in which weak users contribute disproportionately to the error rate (FAR and FRR) of a biometric system. The aim of this work is to utilize this observation to design a multibiometric system where information is consolidated on a...

    Provided By West Virginia University