Tuesday, November 20, 2012

Clouds Role in Disaster Recovery | SaaS Collaboration & Project Mgmt Buyer's Guide | Salvaging Digital Certificates

If you have trouble viewing this email, read the online version.

masthead

InformationWeek Reports Newsletter

November 20, 2012
Featured Content
>
>
>
>
>
>
>
>

Malware Analysis Researchers Announce New Startup

Lastline comes out of stealth with big data-based offering for catching advanced attacks

Get More Information



 
Follow us:  
 More Resources
6 Keys to Business Continuity & Disaster Recovery
Get the key principles, precepts and practices that should be factored into go-forward plans for BCDR.

An Open and Programmable Network Fabric for Datacenters and the Cloud
Learn how to leverage Software Defined Networking to create a smart, simple, secure and scalable solution for the enterprise datacenter and the cloud.

2012 Gartner Magic Quadrant for Security Information and Event Monitoring
Q1 Labs has been positioned as a Leader in the Gartner Magic Quadrant for SIEM.



Social Networking & Collaboration

SaaS Collaboration & Project Management Buyer's Guide
InformationWeek surveyed 322 business technology professionals who use or have used or evaluated security information and event management (SIEM) products in the past 12 months. We asked respondents to rate these products in two major categories: overall performance and SIEM-specific capabilities such as real-time alerts, search and log ­management.
PLUS: Full vendor responses


Professional Development & Salary Data

2012 End User Support/Help Desk Staffing Survey
Thirty-one percent of our survey respondents said they anticipate end user support/help desk will be a top area of staffing decrease -- more than for any other category. However, 16% said this area is one of two that would see the biggest increase in staffing at their companies in the next year. BYOD, social media and the general consumerization of IT may be changing the nature of the internal support role at companies -- and in some cases creating new opportunities for support staffers.


Business Continuity

Expanding Role of Cloud in Business Continuity & Disaster Recovery - Sponsored by EVault
Small and midsize businesses face the same escalated cyber attacks and increased frequency and scope of natural disasters as enterprises. Fortunately, new cloud offerings can help everyone work smarter.


Security

Writing and Enforcing an Effective Employee Security Policy - Sponsored by Verdasys
Security policy has been around for as long as we have had ­computing systems to secure. So why is policy so often ­ineffective? Dark Reading examines the persistent problems ­companies have faced and offers some recommendations for ­developing, communicating and following through with a ­security policy.

Security: Fill the Gaps with Network Monitoring - Sponsroed by Q1 Labs
The use of network monitoring tools in a security context can help companies fill gaps in protection as well as identify potential problems. Used strategically, network monitoring tools may help enterprises to detect potential security problems that they might otherwise have missed -- while also helping security organizations justify additional investment.

Zero-Day Malware: HowTO Detect & Limit Its Impact - Sponsored by FireEye
Antivirus systems alone cannot fight a growing category of malware whose strength lies in the fact that we have never seen it before. Dark Reading examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it.

HowTO: Picking Endpoint Protection - Sponsored by ESET
When it comes to protecting PCs and laptops, IT puts too much emphasis on malware detection. You'll get better results by focusing on performance, management and — most importantly — how users and the security software interact. This report tells you how to evaluate endpoint security software based on what really matters.

Salvaging Digital Certificates
One year ago, Gmail users in Iran woke up to a chilling prospect: Their sensitive and supposedly secure communications on Google's email program may have been tapped by unknown parties. A phony digital certificate in Google's name was used to impersonate the site and let the culprits mount a "man in the middle" attack to intercept and decrypt email sent to Google's servers before passing the messages along to the intended recipients.


InformationWeek Reports is brought to you by EVault, FireEye, NaviSite, NEC, Q1 Labs, Verdasys and UBM TechWeb.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM TechWeb | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment