Infosecurity White Papers
Managing BitLocker Encryption
Take advantage of BitLocker® for Windows 7® by integrating it with the right data protection management solution to ensure and prove compliance. Download to learn best practices for managing BitLocker, how to easily integrate BitLocker into your security program plus how to reduce key management overhead and reporting.
Endpoint Security: Winning the Endgame
Sophisticated malware is proliferating, especially at the endpoints that connect your environment to the rest of the world. Here’s what you need to know about protecting your PCs, laptops and other endpoints in the new security arms race.
Think Your AntiVirus Software Is Working-Think Again
As attacks proliferate, anti-virus software can't keep up. Fortunately, there's a better way.
Unruly USB Devices Expose Networks to Malware
It's pretty easy for organizations to get so wrapped up about what goes out on USB drives that they forget to protect against what comes in their environments via USB
Cost-effective email archiving for SMEs
Comprehensive email archiving, at one time, was a luxury that only larger organizations could afford. But the advent of cloud-based storage and services has changed the economics of email archiving.
Unifying communications to defend against targeted threats
Although most organizations employ email filtering, anti-virus, firewall, and anti-spyware technologies to defend against known threats, far fewer use web or URL filtering appliances to protect themselves against malware picked up on websites. In today’s shifting environment, defending against blended threats that take advantage of multiple attack vectors is imperative.
Top Five Considerations for Removable Media Security
The rapid growth of removable media has revolutionized the way we store and transport information, encouraging increased productivity - as well as a higher risk for a data breach. Download this whitepaper to learn the top five removable media considerations to better secure these devices and avoid a serious breach.
Maintaining continuous compliance—a new best practice approach
When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology. This white paper aims to explore these themes to help organisations develop a strategy that will aid them in maintaining continuous compliance.
Finding Ways to Balance IT Risk and Productivity
While tools such as Web 2.0 applications, IM, P2P and portable USB media can be great for business innovation and productivity, they can introduce significant risks when not managed properly.
Using the Power of the Cloud to Fight Web Threats
Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today’s financially motivated hackers. With web-based malware threats becoming more complex and sophisticated, trying to counter them with software deployed within an organization is becoming a growing headache.
FREE Security essentials – Small Business Security Guide
Small businesses can suffer hours of downtime per year for every computer used in their company, whilst the last two years have seen identity and information theft become the top security concern for the majority of business owners.
Enterprise Authentication: Increasing security without breaking the bank
Enterprise authentication used to be simple: passwords for everyone, expensive tokens for a small number who work remotely. But the world is changing. Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency. Organisations need stronger forms of authentication that are easy to use and less costly to purchase, deploy and maintain than traditional “one-size-fits-all” options.
The in's and out's of content filtering
Dr. Eugene Schultz, Chief Technology Officer, Emagined Security presented at our webinar titled ‘Unifying inbound and outbound content control: Secure your organisation’s web and email traffic’. This is the presentation that he gave.
Data Protection and Compliance in Complex Environments
Today's businesses are often under the gun to meet certain data protection requirements. Unfortunately, many companies lack a cohesive strategy for assimilating, managing, and protecting that data. New regulatory requirements are often placed upon businesses with stiff penalties for noncompliance, with equally demanding deliverable dates. Global organizations are even more complex due to international laws. In Data Protection and Compliance in Complex Environments: The CSO Executive Series by information security expert and author Kevin Beaver, readers will learn how to clearly classify, protect, and report on critical data that requires the highest due diligence and protection efforts.
Case Study: File Transfer Solution To Protect Law Firm's Confidential Data
USB flash drives, removable disk drives and cell phones are making it easier than ever for employees who need to transfer large files – and harder than ever for companies to monitor and protect sensitive information.
Shopping for a Security File Transfer Solution for Retail
Retailers and merchant service providers are under increasing pressure to adhere to PCI DSS in an effort to avoid costly fines — and the even more detrimental loss of customer confidence that results from data leakage or data breaches.
Cashing in on Banking Security and Compliance
With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions that protect sensitive financial information along with their reputations and industry competitiveness.
When Web 2.0 Becomes Security Risk 2.0
Hackers are manipulating the trusted nature of Facebook, MySpace and other social networks to launch exploits and spread malware attacks.
Desktop Software Lockdown: Prevent Targeted Attacks
Preventing the installation and execution of unauthorized software should be a high priority for any IT security conscious organization. Allowing users to install or execute unauthorized software can expose an organization to a variety of security and legal risks, not to mention the burden of increased support costs. This paper will compare and contrast a variety of techniques for detecting and preventing unauthorized code.
Jon Ramsey Podcast Transcript
In this podcast transcript, Jon Ramsey, Chief Technology Officer at SecureWorks, addresses an array of security issues currently facing businesses, including security in the cloud, insider attacks, securing mobile devices and how to manage spam and malware.