effective security

Results 201 - 225 of 260Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
     IBM
By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : ibm, data, it security, data analytics
     IBM
By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint
     BlackBerry
By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
     Cisco
By: SilverSky     Published Date: May 09, 2014
This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. It discusses different options and the methodology for making critical decisions about how to tackle your network security challenges.
Tags : silversky, outsource, network security, the cloud, value proposition, network security solutions, security options, security challenges, insource vs outsource, internal situation, leverage compliance experience, networking, security, it management
     SilverSky
By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
     Cisco
By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : cisco, wan, iwan, network transport, path control, cloud computing
     Cisco
By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
     Cisco
By: IBM     Published Date: Jun 26, 2014
Achieve more stable, effective and manageable endpoint security with Stateful Application Control.
Tags : ibm, security, cyber security, cybercrime, cybercriminals, malware, network security
     IBM
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance
     Q1 Labs
By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : enterprise information, secure, android, apple ios, microsoft window tablets, flexibility
     Citrix
By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security
     Centrify
By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, data management
     Cisco
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : alienvault, limited resources, it time management, it prioritization, it management, security
     AlienVault
By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
     Microsoft Office 365
By: VMware     Published Date: Feb 24, 2017
The economy isn't standing still. For your business to succeed, your employees shouldn't either. With your network infrastructure as a strong pair of legs, the right combination of a seamless user experience and a secure workspace will give users -- and your organization -- the ability to move forward with mobility. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Tags : 
     VMware
By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
     Viavi Solutions
By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
     Symantec Corporation
By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
     Symantec
By: AlienVault     Published Date: Mar 30, 2016
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data.
Tags : 
     AlienVault
By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
     Schneider Electric
By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath
     Creekpath
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com