Tuesday, June 11, 2013

Data Center Decision Time | Building & Enforcing an Endpoint Security Strategy | I Think We're All Botnets On This Bus

If you have trouble viewing this email, read the online version.

masthead
June 11, 2013
Follow us:  
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>
>
>
>

Beware Of The 'Checklist' Penetration Tester
A surefire way to spot a novice.



Read More

I Think We're All Botnets On This Bus
How many undercover researchers can fit under one cover?


Read More

3 Roles For Tape In The Cloud
Cloud storage vendors like to say tape is dead. Don't believe it. Here are three ways you should be using it with the cloud.
Read More



 
 More Resources
Top 3 Myths about Big Data Security
This eBook addresses three myths of big data security: 1) Big data is a buzz word; existing security controls will suffice. 2) Big data deals with social media and sentiment analysis; this data is freely given up by individuals, waiving their security rights. 3) Big data equals Hadoop and Hadoop is used for internal analytics only.

Internet Security Threat Report 2013
For cyber-attackers, SMBs are considered the path of least resistance, used as a steppingstone to breach larger companies. Download the Internet Security Threat Report 2013 which provides SMBs with information they require to better protect their business.

Forces Disrupting the Network (Infographic)
Big data, mobile computing, social media and cloud computing are massively disrupting the network. Get the facts in this infographic.

Cloud Storage: Lower Cost and Increase Uptime
This Aberdeen Analyst report presents results from IT experts on their cloud initiatives & benefits cloud storage users recognize upon adoption.



Data Center

Data Center Decision Time
Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it's the latter. Worse, we often lack agility, 67% say application and hardware philosophies frequently or occasionally conflict business demand, and just 27% say a private cloud is a high priority. Meanwhile, planned use of colocation facilities is up an anemic 5 points over last year.

2013 State of Storage Sponsored by Asigra
A burst of innovation in storage hardware and software means better performance and integration. Some highlights: Ethernet is taking off, with a combined year-over-year boost of 20 points in iSCSI and FCoE; 60% now encrypt at least some stored data; and good help is hard to find, as 26% cite insufficient staffing as a top concern, up from 19% in 2012.

Network Infrastructure

5 SDN Business Benefits Sponsored by NEC
Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that's poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits.

Security

Building & Enforcing an Endpoint Security Strategy Sponsored by Symantec
In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best ­approach to building an effective, enforceable endpoint security ­strategy that works across the enterprise? In this Dark Reading report, we ­examine the ­challenges of endpoint security and recommend the steps ­organizations should take toward developing a security strategy that is both ­effective and practical.

What Every Database Administrator Should Know About Security Sponsored by IBM
Database administrators are the caretakers of an organization's most precious asset-its data-but rarely do they have the experience and skills required to secure that data. Indeed, the goals of DBAs and security pros are often at odds. That gap must be bridged in order for organizations to effectively protect data in an increasingly complex and threat-ridden environment. In this Dark Reading report we examine what DBAs should know about security, as well as recommend how database and security pros can work more effectively together.

Security Outsourcing For The Small Business Sponsored by Symantec
Security is a big issue, especially for small and midsize businesses, and it often makes sense for resource-constrained SMBs to look outside their own IT ranks for support. In this Dark Reading report, we examine the types of outsourced services available and provide advice to SMBs about evaluating their own needs and readiness to establish partnerships with third-party security providers. We also recommend ways to leverage existing products and services so that security budgets can be more effectively allocated.

Five Ways To Better Hunt The Zebras In Your Network Sponsored by HP
This issue of InformationWeek's Must Reads explores ways to protect vulnerable users in your company, lessons learned from the Evernote breach, how the FBI is improving enterprise insider theft detection and more.

Strengthen Enterprise Defenses With Threat Intelligence Sponsored by IBM
The value of threat intelligence is based on organization-specific factors, including how threat intelligence is defined, the data the organization evaluates, the maturity of the shop in question and the use cases for the data. In this Dark Reading report, we examine how a combination of threat intelligence and security monitoring can boost enterprise defenses, and recommend how to determine if your organization is ready to tap into the model.

Offensive Cybersecurity Sponsored by Vormetric
Offense is the new defense for private-sector security professionals, some pundits would have you believe. Whether you call it "hacking back" or old-fashioned eye-for-an-eye retaliation, offensive security calls for profiling and, if possible, individually identifying an attacker and taking countermeasures to harm the attacker's systems. Governments have experimented with offensive security and have their own reasons and hesitations around pursuing it. For the private sector, though, it's a controversial approach that IT and business leaders should understand.

Tools and Strategies for File-Level Data Protection Sponsored by Imperva
There is nothing in the enterprise that warrants protection more than data, but security pros all too often focus more on perimeter security. This may be because it can be more challenging to secure data, but once data is locked down, any compromises to the networks and servers that transport and house it almost don't matter. In this Dark Reading report we recommend several ways that security pros can effectively ensure that data is kept from prying eyes.

Finding Vulnerabilities By Attacking Your Own Environment Sponsored by Lumension
Vulnerability scans are valuable, but you have to think and act like a hacker if you want to truly understand the ways in which your organization could be compromised. In this report, Dark Reading recommends the tools and methodologies that can be used to test your organization's security.

InformationWeek Reports is brought to you by Asigra, HP, Imperva, Lumension, NEC, Symantec, Vormetric, XO Communications and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

Last Chance to Register & Save | E2 Kicks Off on Monday

E2 2013

Hear from the Red Sox, Celtics, HubSpot, Google & More
Having trouble viewing this email? View the web version.

Don't miss E2's news and updates - please add e2@techwebliveevents.com to your contact list or address book.

3 Easy Steps to the Enterprise Software Event of the Year

  1. Check out the video preview from Fritz Nelson, VP & Editorial Director at InformationWeek and E2 Conference Co-Chair.
  2. Register with Priority Code EMUXBN36 and Save $200 Off Current Pricing or Get a Free Keynote + Expo Pass.*
  3. Join us next week at the Boston Marriott Copley Place.

Register

The E2 Conference in Boston kicks off next Monday! We have an exciting program lined up for you: with a Full Event Pass, you'll have access to the entire three-day E2 Conference program including deep-dive workshops, keynotes, conference sessions, sponsored content, the demo pavilion, networking receptions and more.

We look forward to seeing you there!

Cheers,

The E2 Team

Hear Keynotes from Top Organizations

Engage with Leading Sponsors & Exhibitors

Share this offer with your friends and colleagues: FacebookTwitterLinkedIn

*Discount applies to current pricing. Full Event: $1,499.00. Conference: $1,099.00. Keynote + Expo: Free.

© UBM Tech 2013. All Rights Reserved. E2 c/o UBM Tech, 303 Second St., Suite 900 South Tower, San Francisco, CA 94107. UBM Tech, E2, and associated design marks and logos are trademarks owned or used under license by UBM LLC, and may be registered in the United States and other countries. Other names mentioned may be the trademark or service mark of their respective owners.

E2 respects your privacy. This message is sent to qualified recipients who recently attended, or requested or downloaded information about either E2 or a related UBM LLC event or publication or requested information about our events, publications and products.

Unsubscribe from E2 Conference Boston.

This email was sent to sojo.blo@gmail.com. If this email was forwarded to you and you would like to begin receiving a copy of your own, please visit our site to receive E2 news and special offers directly. Please do not reply to this email as replies are not being read.

Privacy Policy

UBM Tech