Security Systems Research
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
A Roadmap for Big Data in Security Analytics
Sponsored by: EMC CorporationStarting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
-
Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
Sponsored by: EMC CorporationTo develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
-
The Big Data Security Analytics Era is Here
Sponsored by: EMC CorporationBig data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
Evaluating the True Impact of Fraud on Financial Institution
Sponsored by: IBMThis guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
-
A UK Security Provider Fortifies its Systems for Greater Resiliency
Sponsored by: IBMThis informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
Sponsored by: IBMThis whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
-
Advanced Persistent Threats: Detection, Protection and Prevention
Sponsored by: SophosDownload this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
-
How to Leverage Free Tools to Secure Web Apps
Sponsored by: ImpervaExpert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
-
Buyer's Criteria for Advanced Malware Protection
Sponsored by: SourcefireThis guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Magic Quadrant for Intrusion Prevention Systems
Sponsored by: SourcefireThis guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
-
Top 5 Reasons to Choose EMC Isilon for Video Surveillance
Sponsored by: EMC & ArrowAccess this concise resource to uncover five top reasons why you should adopt an impressive video surveillance system, so you can gain peace of mind knowing your business is safe and secure.
-
Buyer's Criteria for Next-Generation Network Security
Sponsored by: SourcefireThis whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
-
Avoiding Compliance and Shadow IT Risks in the Cloud
Sponsored by: CloudPassageThis expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Navigating Security in a Mobile World
Sponsored by: Cisco Systems, Inc.This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
-
Strategies For Securing Virtualized Environments
Sponsored by: SourcefireThis whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
-
Selecting a Next-Generation Firewall: Top 10 Considerations
Sponsored by: CiscoIn this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoAccess this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.