Skip the navigation

Security White Papers

Security white papers and technology resources for implementing and optimizing Security strategy, solutions, Security products, and more.

The Pivotal Big Data Suite- Reducing the Risks of Big Data

The explosion of big data and the rapid evolution of big data tools and technologies is challenging IT to meet the demands of business users with limited resources.

In looking at the Pivotal Big Data Suite, Nucleus found its integrated toolset, subscription model, core-based pricing, and unlimited Hadoop enabled organizations to tackle big data challenges while reducing risk.

Sponsor: Pivotal


 

A Survival Guide for Data in the Wild

All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices-usually a laptop, a tablet, and a smartphone-that they use both inside and outside of the office. And outside the corporate firewall, it's a wild world. With so many devices to think about and corporate data growing exponentially every year, you have to change the way that you approach protecting and governing your company's data. With our survival guide in hand, you'll be set up to start defending your data in the wild.

Sponsor: Druva


 

Transforming Security: Designing a State-of-the-Art Extended Team

The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.

Sponsor: EMC Corporation


 

The Big Data Security Analytics Era Is Here

New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management-that depends on up-to-the-minute situational awareness and real-time security intelligence-means organizations are entering the era of big data security analytics.

Sponsor: EMC Corporation


 

Building an Intelligence-Driven Security Operations Center

The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs

Sponsor: EMC Corporation


 

Taking Charge of Security in a Hyperconnected World

In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.

Sponsor: EMC Corporation


 

The Critical Incident Response Maturity Journey

As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.

Sponsor: EMC Corporation


 

Advanced Attacks Demand New Defenses

Security threat and response is a vicious circle of escalating (and increasingly cagey) attacks and sophisticated (and increasingly costly) defenses. The latest generation of malware includes deviously creative evasive techniques crafted to exploit ambiguities in the Internet's underlying technology, flaws in network software stacks, and limitations of security appliances. In this report, we discuss these techniques, how IT teams can test their level of exposure, and how to detect and block attacks using advanced packet normalization.

Sponsor: McAfee


 

Securing Mobility, From Device to Network

At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email) on a single platform (often BlackBerry devices). Those days are long gone. Over the past 10 years, the bring-your-down-device (BYOD) movement has introduced an assortment of devices, apps and services to the enterprise. The massive growth of mobile computing has greatly increased the complexity and difficulty of managing and securing mobile assets.

Sponsor: CDW


 

Data Protection eGuide

For enterprises, the task of protecting data has become more complex than ever. Innovative technologies and systems of engagement are introducing new risks that threaten to expose crucial corporate information. Cyberattacks grow increasingly complex and sophisticated, making it easier for attackers to find and exploit weaknesses in corporate security strategies, and insiders have the power to intentionally or unintentionally expose sensitive information. Meanwhile, the negative impact that data breaches can have on companies is at an all-time high.

In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly difficult task of protecting corporate data. Read on to learn about the issues surrounding data protection today and the strategies you can use to help protect your organization.

Sponsor: AT&T


 

Warning: Cloud Data at Risk

Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the business world are doing, according to the results of an exclusive new survey from IDG Research. This white paper will discuss that survey, describe the risks that relying on SaaS vendors for backup can expose you to, and explain how cloud-to-cloud backup and restore services with the right features and capabilities mitigate those risks.

Sponsor: Spanning


 

The Opportunities and Challenges of the Cloud

The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both private and public deployment models. In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the opportunities and challenges of the cloud.

Sponsor: F5 Networks


 

Mobile First: Securing Information Sprawl

Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content - effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps and content.

Sponsor: Box


 

The Truth About Cloud Security

"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Before you assume that on-site is the only way to keep data safe, it's worth taking a comprehensive approach to evaluating risks. Doing so can lead to big benefits.

Sponsor: Dropbox


 

Enable secure remote access to 3D data without sacrificing visual perfomance

Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for products, they need to be able to collaborate and manage design lifecycles effectively with offshore, mobile and remote employees. At the same time, they have to maintain security and control over intellectual property even as their workforce becomes more mobile and distributed, and their computing environment becomes more diverse.

Sponsor: Citrix | IBM


 

Virtually Delivered High Performance 3D Graphics

"A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy graphical content) are still too large to easily transfer using the Internet or company wide area networks (WANs). Historically, high-powered desktop computers with dedicated 3D graphics hardware were required to support data creation and modification. In addition, the 3D data needed to be on the local area network (LAN), since opening the large files from remote servers was too time-consuming. In some companies, even the typical LAN (1Gb Ethernet) is too slow for the multi-gigabyte data sets that are becoming common.

In this paper, CIMdata reviews business issues associated with graphicsintensive data and 3D applications that can now be addressed by remote 3D graphics technology. This paper also includes an overview of virtualization--a key technology that facilitates flexible cost-effective implementation of a 3D visualization strategy.

Sponsor: Citrix | IBM


 

Best Practices for Securing Hadoop

Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.

Sponsor: IBM


 

Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges

Big data environments create significant opportunities. However, organizations must come to terms with the security challenges they introduce, for example big data environments allow organizations to aggregate more and more data - much of which is financial, personal, intellectual property or other types of sensitive data - most of the data is subject to compliance regulations.
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making.
Organizations don't have to feel overwhelmed when it comes to securing big data environments. The same security fundamentals for securing databases, data warehouses and file share systems can be applied to securing Hadoop implementations.

Sponsor: IBM


 

5 Ways Dropbox for Business Keeps Your Data Protected

Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we've designed the product itself. Download here to find out how we've built Dropbox for Business to keep data safe for all our users.

Sponsor: Dropbox


 

The Keys to Securing Data in a Collaborative Workplace

Losing data is costly. According to the Ponemon Institute, the average data breach costs US organizations an estimated $200 per record, or $5.4 million total per breach. And apparently these breaches are equally likely to be from criminal attack as from employee or contractor negligence. It makes sense then that surveys point to data loss via unsecured file sync and share solutions as one of IT's biggest concerns. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?

Sponsor: Dropbox