Monday, March 31, 2014

Tech Resources: The latest and greatest from The Register

The Register
Tech Resources

31 March 2014

Hello, etechnews today.
Log in to alter your email preferences Login

Check out our other feeds and services

Hello etechnews today Welcome to this Tech Resources update from The Register

Top three mobile application threats

How do you protect your mobile applications?

There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern.

In this whitepaper learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.

Download Now

3 Big data security analytics techniques

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight - a Security Information and Event Management (SIEM) solution from HP - applies these techniques to spot and stop attacks.

APTs use a “low and slow” attack profile that is difficult to distinguish from legitimate activity. But by correlating massive amounts of data from multiple sources you can detect and stop them. The paper presents three techniques that you can apply to any IT environment:

1. Detect account abuse by insiders and APTs.
2. Identify data exfiltration by APTs.
3. Identify and alert to new program execution.

For each technique, the paper presents an approach to detecting the situation and details the steps to implement the approach. Then it goes further to show how HP ArcSight does it. Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.

Download Now

High performance access to file storage

Shared file stores, whether we call them network attached storage (NAS) or file-servers, have long been an important and highly visible service for most IT departments. However, as we've made the transition from sharing word-processing documents within small departments to using file services to support more critical business applications, several limitations of the traditional NAS appliance architecture have revealed themselves.

In this whitepaper learn about the new approach Avere is pioneering for the age old problems of providing high performance access to a common file storage environment.

Download Now

SANS - Survey on application security programs

How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices.

Download this report to see how mature and effective these programs are as well as what tools they use and how they justify budget.

Download Now

HP ArcSight ESM solution helps Finansbank

Turkey’s Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months - far too long. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management.

Within six months Finansbank was able to use HP ArcSight ESM to authorize transactions in near real time. Using its flexible rules engine and advanced correlation, they reduced false positives by 90% and the time to resolve flagged transactions by 80%. Read the report to learn how.

Download Now


Terms and Conditions

By downloading any of the papers, or by watching for any of the live or on-demand events above, you agree that your supplied personal details will be passed on to the sponsor of the paper/event, and that this organisation may contact you in the future with further information about their products and services. You can request a stop to such communications at any time.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.