IT Security: Network Security

Click for details

Die Ransomware-Bedrohung

So erkennen Sie einen Angriff, bevor es zu spät ist

Download…

Click for details

Die Datenschutz-Grundverordnung (DSGVO)

Was Sie wissen müssen, um Ihr Unternehmen vorzubereiten

Download…

Click for details

The Ransomware Threat: A guide to detecting an attack before it’s too late

WannaCry: What we know

Download…

Click for details

The BEC Survival Guide

Click for more details

Download…

Click for details

8 Ways to Protect your Network against Ransomware

Click for more details

Download…

Click for details

Schutz der privaten Cloud mit integrierter und automatisierter Sicherheit

Die IT sieht sich den folgenden drei Hauptherausforderungen gegenüber. Mangelnder Überblick über den gesamten Datenverkehr, um gezielte Angriffe verhindern zu können. Herausforderung, Sicherheit im Tempo der Cloud sicherzustellen. Mangelnde Fähigkeit, Sicherheitsrichtlinien zuverlässig zu verwalten und starke. Service Level Agreements (SLAs) sicherzustellen, um die Anforderungen von. Geschäftsbereichen zu erfüllen

Download…

Click for details

The business case for layered security

Click for more details

Download…

How to Protect Against Ransomware

Ransomware is malware that employs asymmetric encryption to hold a victim’s information at ransom. Asymmetric (public-private) encryption is cryptography that uses a pair of keys to encrypt and decrypt a file. The public-private pair of keys is uniquely generated by the attacker for the victim, with the private key to decrypt the files stored on the attacker’s server. The attacker makes the private key available to the victim only after the ransom is paid, though that is not always the case—as seen in recent ransomware campaigns. Without access to the private key, it is nearly impossible to decrypt the files that are being held for ransom.

Download…

Click for details

Proofpoint Advanced Security Platform for Microsoft Office 365

Proofpoint Advanced Security Platform for Office 365 safeguards against advanced threats and targeted attacks against your Office 365 users, enables you with threat insights to identify these attacks, and helps your security teams orchestrate rapid response and containment. Further, you gain industry-leading hygiene efficacy, and assurances of email service availability, putting control back into IT hands. And our award-winning customer support reflects our commitment to your success.

Download…

Click for details

Is Microsoft Office 365 Secure?

The world is moving to Office 365. Don't leave security, compliance, and control up in the air.

Download…

Click for details

Making the Business Case for Office 365

The current iteration of Office 365 represents Microsoft’s 15-year-plus history of remotely hosted offerings that began in the late 1990s with hosted delivery of Microsoft Exchange through a variety of business partners. So, can a business case be made for deploying Microsoft Office 365? Absolutely yes, and man organizations agree, as shown in the following figure that shows the projected growth of Office 365 over the next two years.

Download…

Click for details

Threat Research: Targeted Attacks on Enterprise Mobile

Click for more details

Download…

Click for details

Intel Security und die MAUSER Fallstudie

Das in Deutschland ansässige Unternehmen ist auf dem richtigen Weg, ein flexibles Abwehrsystem gegen IT-Sicherheitsgefahren zu realisieren.

Im Gegensatz zu zahlreichen Einzellösungen, gelingt es dem neu eingeführten Sicherheitsmodell, sowohl Daten und Arbeitsabläufe, als auch Management-Dashboards in eine zentral zu verwaltende und erweiterbare Umgebung zu integrieren, was Arbeitsprozesse vereinfacht und beschleunigt.

Download…

Click for details

End of support doesn’t have to mean end of security

This white paper reviews the risks facing organizations running end of life (EOL) platforms like Windows Server 2003 and the options available to them to address those risks.

Download…

Click for details

Server Security: Virtualization and Cloud Changes Everything

Key technology trends in server security, and requirements for deploying comprehensive and efficient server security across data center, cloud and hybrid environments.

Download…

Click for details

Email Continuity: Protecting your Business Against Email Downtime!

While a minute or two of email server downtime is not catastrophic, no organization can function effectively if downtime increases to hours or days.

Download…

Click for details

Bullet-proofing Office 365 with MAX Mail

Email is still the most common vector for cyber attacks. Having an extra layer of defense in place has never been more important.

Download…

Click for details

Protecting Business Critical Services – Email

Learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy.

Download…

Click for details

The Enemy Within: Insiders are still the weakest link in your data security chain

Learn the 5 steps that you need to take in order to foster a conscientious data security environment within your enterprise.

Download…

Click for details

Top 10 Data Security Tips to Safeguard Your Business

Hackers, or cybercriminals, are persistently on the lookout for data to steal. Download this whitepaper to learn more.

Download…

Click for details

What Cloud-based contact centres will mean for customer satisfaction

Much has been written about the business benefits of moving the contact centre to the Cloud – but how does this transition translate into benefits to your customer?

Download…

Click for details

IP Voice Specialist, Gamma, Joins Forces with Volta to Transform Communications for Central London B

Any innovative business with growth ambitions must be vigilant about anything that might compromise its flexibility to expand quickly, or take advantage of new market opportunities. Real agility depends on keeping the cost and risk of change low, so that a company can follow the money.

Download…

Click for details

10 Questions to Ask your Data Centre

Whether you’re a business looking to house your servers in a robust external facility, or a managed service provider seeking a base from which to run your services, your choice of data centre is a crucial one that mustn’t be entered into lightly. Here we set out 10 questions to ask of any colocation service provider you may be considering.

Download…

Click for details

8 Reasons Your Engineers Will Love Volta Data Centres

Whether you’re a London business looking for a robust facility to house your IT infrastructure, or a managed service provider supporting customers across the city, your choice of data centre will be critical – not least for your engineers who may need to spend a lot of time on site. Companies sometimes forget to take this into account, but a happy and well-supported engineer will get the job done more efficiently – especially if he or she doesn’t have to make a huge round-trip to get to the external facility. With this in mind, here are eight reasons your engineers will love Volta’s central London data centre.

Download…

Click for details

Visibility into Data Center Security and Operations Management with Trend Micro and Vmware

VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments. Today, most organizations are highly virtualized on VMware, and this has produced significant savings. VMware and Trend Micro are committed to creating solutions that optimize security, manageability, and business continuity, while allowing IT to meet service level agreements (SLAs).

Download…

Click for details

Advanced Threat Protection for Patient Health Information

Better insights and sandboxing with Trend Micro™ Deep Discovery™ Inspector and Trend Micro™ Deep Discovery™ Analyzer gives hospital automated, proactive defense stance against APTs

Download…

Click for details

Gulftainer IT Safe Guarded with Trend Micro Enterprise Suite

Deep Security and Enterprise Security Suite increase visibility and defend against malware to secure VMware and mobile users

Download…

Click for details

Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, 2014–2015

Organizations are being targeted by ever more advanced and persistent malware, which continues to raise threat levels and increases the requirement for better endpoint/mobile device protection.

Download…

Click for details

The State Of Public Cloud Security

Part One Of A Three-Part Series On Public Cloud Security

Download…

Click for details

Custom Defense Against Targeted Attacks

See how adopting a Custom Defense approach will enable you to enhance your current security investments while providing new weapons to fight back against your attackers.

Download…

Click for details

21st Century Threats Demand 21st Century Security Approaches

Forward-Thinking Security Pros Will Guide Their Organizations To A Secure Future

Download…

Click for details

Sage Patch Advice (Sage ERP X3) Customer Messaging Guide Grow Forward with Sage Patch Advice

Sage Patch Advice is a new service for existing Sage ERP X3 customers to help them gain the most benefit and advantage from their solution. Sage Patch Advice lets customers apply the latest Sage ERP X3 patches easily and with confidence.

Download…

Click for details

Sage HR Management version 7 Positioning and Messaging Guide

This document is designed to represent the messaging for Sage HR Management. This messaging supersedes prior messaging documents. This document is designed for sales and marketing professionals who wish to understand the Sage HR Management version 7 solution, market, and positioning. It sets out the product’s global narrative and key messages to be consistently reinforced across our communications. Our vendors should also utilize this messaging as the basis for the material they create to support the Sage HR Management version 7 marketing activities.

Download…

Click for details

Sage ERP X3 version 7 Release Guide

Sage ERP X3 version 7 is designed to deliver faster, simpler, and flexible ERP. Sage ERP X3 version 7 introduces an entirely redesigned user experience, a range of new technology components that are recognized as the best, forward-looking choices in the industry for Web and mobile usage, as well as new and improved functionality. Sage ERP X3 version 7 is now available in one edition, including the standard process flows previously available with Sage ERP X3 Standard Edition and includes a choice of options to cover both local and international configurations and access to advanced capabilities.

Download…

Click for details

Sage ERP X3 v7 V7.1 Launch note

The version 7.1 of Sage ERP X3 is the first commercial release of Sage ERP X3 v7. This version was validated by some early adopters, both customers and partners. Please refer to the Early Adopter Program dedicated to the ramp-up for more information. The objective of this document is to provide the details for the delivery process and the global roll out of this commercial release.

Download…

Click for details

Sage Patch Advice Fact Sheet

Sage ERP X3 is a dedicated solution that lets businesses transform and perform through technology. However, it needs to be maintained and updated to deliver the most benefit – this can be a complex and time-consuming process. Sage Patch Advice is a new service for existing Sage ERP X3 customers that lets users apply the latest software patches easily and with confidence to let them gain the most benefit and advantage from their solution.

Download…

Click for details

Narrowing the Security Gap with Automated Configuration Assessment

As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources. According to HP, 80% of applications contain vulnerabilities caused by incorrect configuration. How do you find these and ensure that system settings stay correct? In this guide you will learn how Qualys Policy Compliance lets you automate IT configuration assessments for stronger security and compliance. Download the guide now to learn more about: • How incorrect configurations cause severe vulnerabilities • Best practices to help you find and enforce configuration policies • Benefits of automating configuration assessments • How to reduce risk from incorrect configuration of IT resources with an easy, automated solution to maintain correct settings

Download…

Click for details

Critical Security Controls: From Adoption to Implementation

The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Center for Internet Security, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.

Download…

Click for details

Continuous Monitoring

A New Approach to Proactively Protecting Your Global Perimeter

Download…

Click for details

Six Essential Elements of Web Application Security

When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents. This whitepaper highlights the six key best practices that industry-leading organizations are using in their web application security efforts while reducing resource requirements and lowering the TCO.

Download…

Click for details

Best Practices for Selecting a Web Application Scanning (WAS) Solution

With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented. With today’s automated, highly-accurate technology, you can now test all of your apps – in development, QA and production – whether you have a handful or many thousands. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution.

Download…

Click for details

SANS Survey on Application Security Programs and Practices

Over the past five years, applications—particularly web applications—have been increasingly leveraged as a top vector of attack. With the trend toward mobile applications and cloud computing, SANS decided to conduct this rst SANS survey on application security to focus on understanding what works in application security (aka “appsec”) and why. We wanted to address the following specific questions: • What is driving organizations’ application security programs? • Where do organizations see the greatest risks? • Where are organizations focusing their application security resources? • What practices are most organizations following? • What tools and services do organizations rely on the most? • What are the specific challenges to organizations’ application security programs? • How mature are organizations’ programs? • How effective are organizations’ programs?

Download…

Click for details

Web Application Security For Dummies

Web application security may seem like a complex, daunting task. This book is a quick guide to understanding how to make your website secure. It surveys the best steps for establishing a regular program to quickly find vulnerabilities in your site with a web application scanner. You will learn: • Why web security matters • How to establish a web app security program • The benefits of automated scanning • How automation can ease finding and fixing web app vulnerabilities

Download…

Click for details

The Big Shift to Cloud-Based Security

How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget.

Download…

Click for details

IT Policy Compliance For Dummies

This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization’s IT operations to comply with laws and regulations – and how to prove compliance to an auditor. In this book you will discover: • What IT policy compliance is all about • How laws and regulations govern compliance • Ten best practices • How automation can ease compliance and save money

Download…

Click for details

Analyse d’une infrastructure cybercriminelle

Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime group to infect over 500,000 PCs.

Download…

Click for details

Magic Quadrant for Secure Email Gateways

The secure email gateway market is fractured between providers of basic protection delivered by embedded functionality from incumbent email, firewall, or endpoint protection solutions; and vendors that focus on the state of the art in advanced attack and information protection.

Download…

Click for details

Version Everything for Outstanding DevOps Performance

Over the last five years, the DevOps movement has brought Development and Operations teams together to meet the common goal of releasing better-quality software faster. A key to DevOps success is the adoption of and adherence to a much advocated best practice: version everything.

Download…

Click for details

A Prescriptive guide to Third Party Risk Management

Third-party due diligence is a critical component of any effective compliance program. According to the U.S. Department of Justice, in 2012, more than 90% of its anti-corruption actions involved a company’s use of third parties. Compliance program leaders worry that they don’t know where to start when designing a process for reviewing all third-party business partners. This Prescriptive Guide to Third Party Risk Management will help practitioners standardize the due diligence process and implement a risk-based and resource-effective process to meet the expectations of major legal regulations.

Download…

Click for details

Surfacing Critical Cyber Threats Through Security Intelligence

The rapidly expanding supply chain supporting the cybercrime economy is empowering cyber criminals, cyber terrorists and even nation states in ways that put companies, critical infrastructure and governments at increased risk. The fate of an organization whose defenses have been compromised will be determined by the speed with which they can detect and respond to intruders. A mature security intelligence posture boosts an organization’s resiliency amidst these advanced threats. If intruders are detected early in their lifecycle, organizations can respond quickly and potentially avoid loss altogether. In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats. Key themes to be covered include: • Emerging cyber threat vectors in 2015 • Security Intelligence and the critical role it plays in addressing high-impact threats • Using the SIMM to assess your current Security Intelligence Maturity • How to move from “greatly exposed” to “highly resilient” via End-to-End Threat Lifecycle Management

Download…

Click for details

The Cyber Threat Risk – Oversight Guidance for CEOs and Boards

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.

Download…

Click for details

SANS “Top 20” Critical Controls for Effective Cyber Defense

In a rapidly evolving threat landscape, organizations must protect their entire IT environment against both external and internal attacks. Threats and risks arrive from many angles, requiring security professionals to use a wide variety of methods to defend against attacks. As a result, many organizations are now adopting the 20 Critical Security Controls developed by the SANS Institute. These controls help organizations prioritize the most effective methods and policies for safeguarding their assets, information and infrastructure.

Download…

Click for details

Retail Cyber Crime

Over the past few years, several retail organizations have been hit with high-profile data breaches that have left millions of customers’ credit card details and personal information exposed. Retailers will continue to be prime targets for motivated cyber criminals targeting sensitive and lucrative customer data, and must take steps to secure delicate information.

Download…

Click for details

The APT Lifecycle and its Log Trail

Advanced Persistent Threats, or APTs, are a growing concern in the security industry. APTs differentiate themselves from other types of hacking activities by targeting a specific organization for a specific target, often extremely high pay-off data.

Download…

Click for details

DDoS Defense for Financial Services Companies

Distributed denial of service (DDoS) attacks are increasingly becoming one of the most grievous security threats that any company with a significant online presence faces. In fact, four of the top five security threats today are DDoS related, with an average of 2,000–3,000 DDoS attacks per day on enterprises, financial institutions and governments.1 And the reality is that the severity, frequency and complexity of these attacks are on the rise, with no end in sight.

Download…

Click for details

DDoS Mitigation in a BYOD Architecture

The rapid consumer adoption of tablets, smartphones and other mobile devices creates a new challenge for corporate IT departments. This phenomenon is called “bring your own device” (BYOD).

Download…

Click for details

Protect Your Business

Purpose-Built DDoS Defense for eCommerce

Download…

Click for details

End-to-End DDoS Defense for Financial Services

Motivated by idealistic and monetary goals, well-organized hacker groups have set their sights on financial institutions and are attacking with a vengeance—armed with institutional intelligence and striking with unprecedented persistence. Because of this, every financial services company—whether a multi-million dollar bank or a local credit union—is now a potential target for distributed denial of service (DDoS) threats.

Download…

Click for details

Know and Secure the Enterprise

In today’s hyper-connected world, the financial performance and brand integrity of your company greatly depend on the operational performance and security of your network.

Download…

Click for details

Cybercriminals Use What Works: Targeted Attack Methodologies for Cybercrime

This research paper will give details on some of the reasons why cybercriminals are adopting targeted attack methodologies by delving into a few case studies that show how they are doing so.

Download…

Select a topic