Tuesday, June 18, 2013

Endpoint Protection: Tablet Trouble | Security Implications Of Big Data | E-Discovery, Mobility & the Cloud

If you have trouble viewing this email, read the online version.

InformationWeek Analytics Newsletter
masthead
June 18, 2013
Follow us:   
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>

Endpoint Data Protection: Tablet Trouble
Backup managers should look at bringing endpoint protection in-house and using it to protect tablets.
Read More

Bad SSH Key Management Leaves Databases At Risk
Not enough oversight of keys leaves SSH clients open to abuse


Read More



 
 More Resources
Steps to Take Before Choosing a Business Continuity Partner
This Aberdeen Analyst report details the necessities in creating business continuity plans & if there's the need to outsource part/all of the process.

Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.

2013 Gartner Magic Quadrant for SIEM
IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements.

10 Things to Look for in a SDN Controller
Noted industry expert, Dr. Jim Metzler provides insight on the key elements to consider in an SDN controller, bringing clarity to SDN decisions and giving an insider's perspective on what is truly possible with this emerging technology.



Security

5 Security Tools Every Small Business Must Have Sponsored by Symantec
SMBs may not have the IT resources that their bigger peers do, but they do have the same responsibilities when it comes to security. Fortunately, SMBs can build a strong security posture using a few key products, many of which are free. In this report, Dark Reading examines the challenges that SMBs face when it comes to security and recommends the five security tools every SMB must have.

Security Implications Of Big Data Strategies Sponsored by IBM
To understand how to secure big data, you have to understand what it is - and what it isn't. As organizations set about building big data clusters, they're finding that many of the best practices for securing such clusters are the same used to secure any corporate data. However, there are some big differences as well. Here are some recommendations on how to alter your security strategy to accommodate big data - and when not to.

A Guide to Network Vulnerability Sponsored by Lumension
Building a more robust network vulnerability management program can help you identify security holes before an attacker does, as well as develop more secure systems and applications in the future. In this Dark Reading report, we examine the products and practices that will get you there.

Security

Enterprise Defenses With Threat Intelligence Sponsored by IBM
The value of threat intelligence is based on organization-specific factors, including how threat intelligence is defined, the data the organization evaluates, the maturity of the shop in question and the use cases for the data. In this Dark Reading report, we examine how a combination of threat intelligence and security monitoring can boost enterprise defenses, and recommend how to determine if your organization is ready to tap into the model.

10 Emerging Threats Your Company May Not Know About Sponsored by HP
The devil you know is better than the one you don't. Never was that adage more true than in today's complex, ever-changing computing landscape. In this Dark Reading report, we examine 10 emerging threats that you should have on your radar now.

Insecurity with Java Sponsored by Imperva
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

Applications Monitoring For Security Professionals Sponsored by IBM
When it comes to monitoring, the application space is often forgotten. The inherent variability of applications can make monitoring a challenge, but enterprises can extend existing tools to include the applications space. In this report, we make the case for the development of an applications monitoring strategy and provide recommendations for implementation that tap into existing products and processes.

2013 Wireless LAN Survey Sponsored by Symantec
Given the cost of cellular access, the multiplying number of mobile devices and the imminent ratification of the superfast 802.11ac specification, we decided to survey InformationWeek readers about their wireless LANs today and plans for the future. Among the 419 respondents to our InformationWeek 2013 Wireless LAN Survey, 89% use 802.11n technologies as a network access method for end users, up from 76% in September 2010.

InformationWeek Reports is brought to you by Asigra, HP, IBM, Imperva, Lumension, NEC, Symantec and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment