Tuesday, February 5, 2013

Tips & Tricks: Insider Threat Protection | Unified Threat Management | Compliance In The Smart Grid

If you have trouble viewing this email, read the online version.

masthead
February 05, 2013
Follow us:    
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>


You Still Stink At Patching Databases

Only about a fifth of organizations patch their databases within three months, and that number is unlikely to get better anytime soon, experts say
Read More


Legitimate Sites Are Most Likely To Serve Up Malware, Cisco Study Says

About a third of all malware is encountered in the U.S., Cisco annual security study finds.

Read More



 
 More Resources
5 Critical Components of an Information Security Program
Learn five components that any information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements.

Buyer's Guide: Business-Driven IAM
Read this guide to learn how a successful IAM project can help you gain full visibility into who has access to what applications and data sources, while avoiding compliance mishaps, audit pains, and broken vendor promises.

Security Management 2.0
Is it time? Has your first gen SIEM failed to meet expectations despite your investment? Read this white paper to learn how easy it can be to replace your SIEM with a next generation solution.

IT's Time to Evolve your Endpoint Malware Detection
This whitepaper review's the evolution of advanced targeted attacks, the various approaches used to address them and how organizations should think about their current and future malware defense strategy.



Compliance

Achieving Compliance In The Smart Grid - Sponsored by TraceSecurity
In most industries, compliance mandates can feel like more of an annoyance than a necessity. In the energy business, strict compliance mandates could be all that stands between business as usual and a catastrophic, long-term power outage. Standards regulating the smart grid, are rightly stringent and often difficult to meet, but they can be modified and leveraged by organizations in all industries to lock down corporate and customer assets.

Security

IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.

Identity and Access Management 101 - Sponsored by Aveska
An Identity access management(IAM) project can be a daunting proposition. But it doesn't have to be. With careful planning and a firm understanding of the goals for and challenges of IAM, it is possible to lay an IAM foundation that will meet your organization's unique identity and access management needs now and in the future. Read this report to get the an introduciton and understanding of IAM so you can start building your blueprints.

NMaaS: Network Monitoring As a Security Tool - Sponsored by Q1-IBM
The use of network monitoring tools in a security context can help companies fill gaps in protection as well as identify potential problems. Used strategically, network monitoring tools may help enterprises to detect potential security problems that they might otherwise have missed -- while also helping security organizations justify additional investment.

Tips & Tricks: Insider Threat Protection - Sponsored by Verdasys
Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage - especially when it comes to intellectual property theft. In this retrospective of recent Dark Reading coverage, we look at the hot trends and tips on how to flip the equation on the insider threat.

Mobility & Wireless

Why Apple Is IT's Arch Frenemy
Our Apple Outlook Survey is decisive: More than 90% of the 331 IT decision-makers that we surveyed either already support iPhones and iPads or have plans to do so. Even more surprising is that more than 80% support or plan to support Mac laptops and desktops. The kind of sea change that represents can't be overstated -- not that long ago Apple's presence in the enterprise, outside of a few core markets, was negligible. But is IT really on board or just bowing to pressure from users enamored of their iDevices?

Feds Face Challenges in Mobility Mandate
The goal of the White House's Digital Government Strategy, spelled out in minute detail in a 36-page document, can be summed up in a few words: Make federal information and services available to the public "anytime, anywhere, on any device."

InformationWeek Reports is brought to you by Aveska, TraceSecurity, Trusteer, Verdasys, Q1-IBM and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment