The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. The following kit contents will help you get the most out of your Information Security research:
Request Free! |
The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook
Space Weather Outlook June 29, 2014 at 10:16PM
Advanced Persistent Threats: Hijacking Insider Credentials
Do you really know who's seeing the sensitive data on your network? Download the NetIQ Flash Point Paper Advanced Persistent Threats: Hijacking Insider Credentials to learn how someone with malicious intent might be able to get onto your network by impersonating your employees. In this paper, you'll learn:
Don't be left in the dark, wondering who is on your network. Download this paper today. Request Free! |
Managing the Consumerization of IT
Mobile technology has changed the corporate world forever. Users are determined to use their personal devices, causing a lot of security concerns for IT. Some solutions—like giving IT control or visibility into the device—are frustrating to users, but IT needs some control. Solve the problem with mobile access. In the NetIQ Flash Point Paper, Managing the Consumerization of IT: Mobile Access for the BYOD World, you'll learn:
Don't let the security risks and user frustration of BYOD policies continue. Read this Flash Point Paper today. Request Free! |
Contractor Access: Mitigating Security and Risk Issues
Contractors introduce a unique challenge for businesses and for IT. Their contracts are limited, so you need to be able to quickly give them access to the right data, limit their access to other data, and ensure their access ends when their contract does. But how can you do that for all of them? In the NetIQ Flash Point Paper Contractor Access: Mitigating Security and Risk Issues, you'll learn:
Giving access to contractors shouldn't mean exposing the organization to risk. Read this Flash Point Paper today. Request Free! |
2014 Cyberthreat Defense Report
As trusted experts in cybersecurity, CyberEdge has provided the 2014 Cyberthreat Defense Report to illustrate the current security landscape and make near-future projections. In addition to attack statistics from North America and Europe, you'll learn where most IT professionals see weaknesses in their environment and how they plan to strengthen those areas. Some things you'll learn are:
Don't let cyberattacks get the best of you. Download this report today. Request Free! |
Virtual Patching: Lower Security Risks and Costs
It discusses how traditional approaches to remediating vulnerable systems can create new problems and provides a new model that keeps pace with the ever-increasing number of attack vectors. Download now to learn more. Request Free! |
VMware Solution Guide for Payment Card Industry Data Security Standard
With the help of this guide, organizations can learn how to accelerate complete adoption of VMware technologies with integrated security controls; adapt security policies to both physical and virtual IT environments, and advance endpoint security and protection using centrally managed virtual capabilities. Request Free! |
The Challenges of Securing a Virtual IT Infrastructure
Find out what your peers are doing to get the most out of their security investment, including:
Request Free! |
Space Weather Outlook June 23, 2014 at 12:39AM
Perfect Forward Secrecy The Next Step in Data Security
That's why Symantec is continuing to innovate with Perfect Forward Secrecy—SSL certificates that feature ECC. Elliptic Curve Cryptography allows increased performance and protection with shorter key lengths to bring greater confidence to you and your customers. Request Free! |
The CIO Playguide for Secure BYOD
Mobile devices and the ability to work everywhere present a huge opportunity but also pose a challenge for IT in securing corporate data. This ebook provides essential insights for planning and deploying BYOD processes and tools to mitigate security risks and assure proper compliance. Ensure a successful BYOD program today, download the free ebook. Request Free! |
Space Weather Outlook June 15, 2014 at 11:47PM
Email Security: Keeping Your Brand Safe
From secure transmission and reception of an email to authentication of email messages with SPF and DKIM to monitoring and blocking phishing attacks with DMARC, this webinar is packed with helpful and useful email security knowledge. Dyn’s Chris Brenton, Director of Security, and Scott Grant, Associate Product Marketing Manager, will provide best practices and tips on how to keep your corporate brand safe. Request Free! |
DNS Build vs. Buy: Cloud vs. On-Premise
In this webinar, Dyn Chief Technologist, Cory von Wallenstein, discusses whether enterprise users should build their own internal DNS infrastructure or use managed services in the cloud instead. Learn about the known and hidden costs of on-premise solutions, what managed services really means, why staffing can be harder than you think, and more! Request Free! |
Identity Management 'How To' for Office 365
Office 365 is one of the fastest-growing businesses in Microsoft history, and for good reason: it provides organizations of all sizes with hosted versions of Exchange, SharePoint, Lync – and much more. Before deploying Office 365, there are several options to consider for managing user identities, each with different implications for IT and users. In this webinar Paul Andrew, Senior Technical Product Manager at Microsoft, will discuss options for Office 365 identity management, with a focus on how user accounts can be synchronized with on premise Active Directory. Corey Williams, Senior Director of Product Management at Centrify will review how you can use Centrify to provide Active Directory-based single-sign on to enterprise and SaaS apps including Office 365, while protecting sensitive company data. He will discuss Centrify single sign-on for a full range of user scenarios across PC, tablet and mobile devices. Corey will provide a demo of Centrify for Office 365, a Microsoft-validated and easy-to-deploy Azure-based solution for Active Directory-based single sign-on, user provisioning and mobile management. Speakers: Paul Andrew - Senior Technical Product Manager, Microsoft Corey Williams - Senior Director of Product Management, Centrify Corporation Request Free! |
Achieving Best Practices for Virtual Machine Backup and Recovery
This Lab Validation report from ESG provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and operational costs. Request Free! |
How to Get the Most Out of DNS in an Active Directory Environment
A highly effective approach to providing enterprise-grade DNS services in your Microsoft Active Directory environment can immediately enhance security, manageability, and availability for core network services. This white paper will share insights on the reasons why migrating to Infoblox DNS will provide superior DDoS protection, centralized management, and enhancements to AD functionality. This detailed and practical resource can be the first step in transforming your Microsoft environment. Request your copy of this white paper to learn how to get started today. Request Free! |
White Paper: IDC The Evolution and Value of Purpose-Built Backup Appliances
In addition, this white paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process. Request Free! |
Defend Web Properties From Modern Threats With Citrix NetScaler
Today, defending your organization's web properties means more than just protecting a handful of enterprise web applications from advanced malware. Request Free! |
Why Midsize Organizations Need Business Continuity/Disaster Recovery Even More than Enterprises Do
Midsize organizations are more likely than their larger enterprise counterparts to identify data protection as a top IT priority over the next 12 months. In fact, data protection – specifically, improved data backup and recovery processes and business continuity/disaster recovery programs – accounted for the top-two overall most important IT priorities mentioned by midsize organizations. But even though midmarket companies have less expert support on hand than their enterprise counterparts, they need business continuity and disaster recovery planning expertise more than larger enterprises do. After all, they usually don't have the latest and greatest high-availability products integrated into their environments, and they don't have “Clark Kents” dedicated solely to keeping their eyes on all things, always ready to pull on their capes and maximize the chance of fast recovery from a disaster. Request Free! |
Getting the Most Out of Your Tivoli Endpoint Manager Deployment
IBM Tivoli Endpoint Manager (ITEM) is a product designed to let enterprises automatically manage computers, allowing thousands of them to be managed by just a few support staff. With ITEM, tasks such as patch application, software distribution, and security policy enforcement can be performed on all of an organization's computers with minimal supervision. Request Free! |
Home Wireless Setup 101
Setting up a wireless network that is reasonably secured is not complex. This paper explains how to defend against wireless based network compromise by avoiding known WAP firmware flaws, prevent management interface access, stop eavesdropping with strong encryption, and block access to those without proper authentication. Request Free! |
Space Weather Outlook June 09, 2014 at 12:13AM
Best Practices for Successful IP Address Management (IPAM)
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP Address Management (IPAM) is growing. The ever-increasing size of today's networks, keeping track of multiple types of data pertaining to the devices connected across the network becomes increasingly difficult. IPAM today has to go beyond allocation and tracking to centrally maintaining a real-time view of additions, moves, and changes. This white paper explains best practices for creating a central repository that combines IP addresses with pertinent information such as host names, device types, and locations tying this information together with a single, clear, easy-to-manage interface. Request Free! |
How to Get the Most Out of DNS in an Active Directory Environment
A highly effective approach to providing enterprise-grade DNS services in your Microsoft Active Directory environment can immediately enhance security, manageability, and availability for core network services. This white paper will share insights on the reasons why migrating to Infoblox DNS will provide superior DDoS protection, centralized management, and enhancements to AD functionality. This detailed and practical resource can be the first step in transforming your Microsoft environment. Request your copy of this white paper to learn how to get started today. Request Free! |
Regulations and Standards: Where Encryption Applies
This white paper describes the different types of data under regulation and offers best practices for implementing appropriate encryption technologies. Download this white paper and learn:
Request Free! |
Adding Extra Security to Cloud Storage
Download this white paper and find out how applying data encryption everywhere enables users to manage access to the cloud without placing data or businesses at risk. Request Free! |
Encryption Buyers Guide
Use this buyer's guide to help you evaluate encryption solutions and decide which one fits your needs. This guide will help you:
Request Free! |
Space Weather Outlook June 01, 2014 at 11:30PM
Setting up a Fax and Voicemail Honeypot
Every time a new fax or voicemail is received, the message is automatically sent to my Gmail as an attached file.
Recently I enhanced this using IFTT so that I can keep a running log of when the messages come in, and look for any patterns.
It's amazing how my honeypot company receives faxes from their non-existent HR department every week, offering discount vacations and cruises! The most recent example of this is pictured below.