Skip Links

Network World

Resource Library

  • Taking Windows Mobile on Any Device
    Source: Citrix Systems
    White Paper: Taking Windows applications and desktops mobile has many advantages, but the process of identifying a single solution is complex. Learn how Citrix XenApp solves this complex problem.
  • Empower a Mobile Workforce with Secure App Delivery
    Source: Citrix Systems
    White Paper: Mobility has given people new freedom to work anywhere, on any device- but it has also added new complications for IT. Learn how Citrix XenApps helps people be productive on any device.
  • Best Practices for Enterprise Security
    Source: Citrix Systems
    White Paper: How Citrix helps organizations manage risk while empowering business mobility by controlling access to applications and data across any location, network and device.
  • How Can I Protect Privileged Credentials Across my Traditional and Virtual Data Centers, Private and Public Clouds and Hybrid Environments?
    Source: CA Technologies
    White Paper: Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization' investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
  • Breaking the Kill Chain: Stopping Data Breaches with Privileged Access Management
    Source: CA Technologies
    White Paper: When we consider the current stream of security incidents, it's common to refer back to the Target incident, which began in late 2013. With some 70 million payment card records stolen, Target wasn't the first-or even largest-data breach to take place in history, let alone in 2013. However, for a variety of factors, the Target breach did serve to galvanize the interest of multiple critical constituencies in the intensely damaging nature of these ongoing attacks. Since the Target breach, we've witnessed countless smaller, less publicized breaches, along with a continuing string of larger-scale incidents, such as the Home Depot and JP Morgan Chase incidents about one year later and most recently, as of this writing, the Experian breach of the extremely sensitive personal data of some 15 million T-Mobile customers.
  • Addressing PCI Compliance: Through Privileged Access Management
    Source: CA Technologies
    White Paper: Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.1 PCI DSS v3 established various requirements for safeguarding an organization's relevant systems and networks, comprising the Cardholder Data Environment (CDE). With requirements for strong authentication and access control to the CDE, organizations are challenged with the difficult tasks of implementing multi-factor authentication, access control and activity reporting tools or practices, particularly for privileged or administrative access to these systems.
  • Unifying Cloud Security Across Infrastructure and Applications
    Source: Palerra
    White Paper: Increased agility enabled by cloud computing has created a "cloud first" strategic imperative for many organizations. Leveraging the power of cloud apps and on-demand infrastructure is essential for competitive advantage, if not parity, as is mitigating the associated risks and costs. However, existing security controls were designed for neither auto-scaling infrastructure nor applications that store data in a multi-tenant cloud and that are accessed by an increasingly mobile workforce. As a solution that is built in the cloud for the cloud, Palerra's LORIC platform is an attractive option for cloud-leaning organizations seeking to unify their security posture across cloud infrastructure and applications.
  • The Treacherous 12: Cloud Computing Top Threats in 2016
    Source: Palerra
    White Paper: At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standards, businesses are vulne able to security breaches that can erase any gains made by the switch to cloud technology.
  • Working the Numbers: How to Quantify the Value of a Cloud Access Security Broker
    Source: Palerra
    White Paper: It is challenging to measure return on investment (ROI) for information security (InfoSec) technology. Enterprises usually treat InfoSec technology as an insurance policy against the potentially devastating costs of not deploying it. From that perspective, your security technology ROI can be determined by the time it takes for a breach to occur that has cost consequences that are equal to or greater than your investment. Your ROI could be immediate. Or it could be longer term. With that in mind, it is hard to justify yet another security technology, but a move to the cloud suggests that you should.
  • Importance of User Behavior Analytics for Cloud Service Security
    Source: Palerra
    White Paper: Traditional security measures based on protocol analysis and virus signatures are much more applicable to legacy threats found in the wild than the modern threats designed to target specific enterprises. These solutions alone simply cannot cope with the ever increasing savviness of users who, for sake of productivity and convenience, often attempt to bypass existing security measures and company policies. Traditional security measures also do very little to detect internal threats which are becoming an increasing concern for many enterprises. In order to combat modern threats, many enterprises are turning to security solutions leveraging User Behavior Analytics (UBA). This paper examines the value of UBA for cloud services and why analysis on the actions performed by particular users, forming a baseline of what's considered normal behavior and then continuously monitoring for actions that deviates from the accepted norm are all critical components of modern security solution.
  • Cloud Security Automation: How to Make AWS Security as Agile and Effective as your AWS Environment
    Source: Palerra
    White Paper: Business agility, affordability, and elasticity are the primary reasons why enterprises embrace Amazon Web Services (AWS). AWS removes traditional infrastructure deployment hurdles, enabling DevOps teams to build, test, and deploy new functionality quickly, based on the needs of the business. Add the ability to grow as you go, paying only for the services you need, and it's clear: the benefits of cloud services like AWS are not only compelling, they are mandatory in today's high-speed, ultra-competitive market.
  • Pivot3 Named a Leader in The Forrester Wave™: Hyperconverged Infrastructure (HCI), Q3 2016
    Source: Pivot3 Inc
    White Paper: With customer expectations constantly changing, enterprises need a flexible cloud computing model to overcome legacy IaaS challenges—and hyperconverged systems are offering businesses that opportunity. However, to fully reap the benefits of this exceptional form of disruption, your organization needs to select the right vendor. Read this research report from Forrester to examine the hyper-converged landscape and review how you can make the right vendor choice for your business technology agenda.
  • Fortinet Security Fabric
    Source: Fortinet
    White Paper: The evolving enterprise network and its transition to a digital business model is one of the most challenging aspects of network security today. As significant trends in computing and networking continue to drive changes across many critical business infrastructures, architectures, and practices, organizations are looking for innovative network security solutions to help them embrace those changes.

    The Fortinet Security Fabric can provide the scalability, security, awareness, actionable intelligence, and open API strategy your organization needs, enabling the security, flexibility, scalability, collaboration, adaptability, and manageability you demand across your physical, virtual, and cloud environments, from end to end.
  • 2016 Security Threat Report: FortiGuard Eye of the Storm
    Source: Fortinet
    White Paper: The 2016 Security Threat Report presents threat data analysis and findings to show recent trends in cyber threats. It offers contextual research insights and considerations for mitigating risks associated with cyber threats, and summarizes the implications of cyber threats on current and upcoming 2016 global events. Our hope is that you find meaningful ideas to consider for your security strategy that will help elevate your security posture.
  • NSS Labs 2016 Breach Detection System (BDS) Group Test Results
    Source: Fortinet
    White Paper: There is arguably no industry more full of hype than the security industry. The number of vendor claims can quickly overwhelm customers seeking to better protect their organizations. In the subcategory of network sandboxing, the 2015 Gartner Market Guide identified more than 20 vendors and clearly there are many more than those noted.

    As a result, there is no substitute for testing critical security products within an organization's production environment for an extended period of time. But expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. FortiSandbox showcased its ability to detect nearly all of them.

Results 1 - 15 of 602