Data Security White Papers
Data Security white papers and technology resources for implementing and optimizing Data Security strategy, solutions, Data Security products, and more.
This paper explores the good, bad and ugly of big data in cybersecurity and provides tips for understanding cyber risk in complete business context that includes your industry sector, infrastructure, company size, supply chain, location, your online presence, and many more factors.
Sponsor: Surfwatch Labs
Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk
This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.
Sponsor: Surfwatch Labs
Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security
Data volumes are growing rapidly with no end in sight. Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.
A More Predictable Way to Budget Software Costs
More predictable budgeting for software licenses was one motivation to adopt Adobe Creative Cloud. Read this case study to learn the other benefits that Wavetronix achieved, including elimination of upgrade and version compatibility worries, improved collaboration among departments, and access to new creative tools.
Adobe Creative Cloud for teams Security Overview
Adobe takes the security of your digital experience seriously. From their rigorous integration of security into their internal software development process and tools to their cross-functional incident response teams, they strive to be proactive and nimble. What's more, their collaborative work with partners, researchers, and other industry organizations helps them understand the latest threats and security best practices, as well as continually build security into the products and services they offer.
This white paper describes the proactive approach and procedures implemented by Adobe to increase the security of your Creative Cloud experience and your data.
3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats
This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight-a Security Information and Event Management (SIEM) solution from HP-applies these techniques to spot and stop attacks.
IT Security by the Numbers: Calculating the Total Cost of Protection
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
SBIC: Transforming Information Security
This report, the third and final in a series on Transforming Information Security, combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
Sponsor: RSA Security, Inc.
HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months-far too long. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management.
Guard data in government environments by implementing continuous diagnostics and mitigation
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Current Data Security Issues of NoSQL Databases
No SQL databases, sometimes referred as Not¿Only¿SQL databases, have recently gained much attention and popularity because of their demonstrated high scalability and performance. The primary advantage of NoSQL databases is that they are designed to efficiently store significant amounts of unstructured data. Facing the "Big Data" problem that has challenged most traditional relational database management systems (RDBMS), major Web 2.0 companies have developed or adopted different flavors of NoSQL databases for their growing data and infrastructure needs, including Amazon (Dynamo), Google (BigTable), LinkedIn (Voldemort), Facebook (Cassandra).
Sponsor: General Dynamics Fidelis Cybersecurity Solutions
Top 10 Endpoint Backup Mistakes
The mobile workforce is rapidly obsoleting traditional backup strategies. Failure to adapt puts your data (and your job) at risk.
* Mistake #1: Not backing up laptops and mobile devices makes every device a ticking time bomb
* Mistake #7: Not picking the right deployment model could cost you thousands down the road
* Mistake #9: Disregarding BYOD leaves data on personal devices in the dark
Access the white paper "Top 10 Endpoint Backup Mistakes" and learn how to avoid them.
Gartner Critical Capabilities for Enterprise Endpoint Backup
Given the rise of mobility and BYOD, endpoint backup must evolve to meet the unique needs of the mobile workforce. To help organizations evaluate backup solutions to meet these needs, Gartner compared 7 vendors against 11 critical capabilities in their report.
For the 2nd year in a row, Gartner ranks Druva #1 for overall product rating, with highest scores in key categories including mobile device support, security, and data reduction.
Access the report to learn why inSync received the highest overall rating and is the top choice for the mobile workforce.
A Survival Guide for Data in the Wild
All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices-usually a laptop, a tablet, and a smartphone-that they use both inside and outside of the office. And outside the corporate firewall, it's a wild world. With so many devices to think about and corporate data growing exponentially every year, you have to change the way that you approach protecting and governing your company's data. With our survival guide in hand, you'll be set up to start defending your data in the wild.