Tuesday, October 14, 2014

Tech Resources: The latest and greatest from The Register

The Register
Tech Resources

14 October 2014

Hello, etechnews today.
Log in to alter your email preferences Login

Check out our other feeds and services

Hello etechnews today Welcome to this Tech Resources update from The Register

The Heartbleed Bug: how to protect your business with Symantec

The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities.

While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?

Download Now

A strategic approach to identity relationship management

In April 2014, ForgeRock commissioned Forrester Consulting to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones. Forrester tested the assertion that companies can obtain significant value by implementing IRM solutions that treat customer identities, and their identity data, as mission-critical for the top line of the business.

In conducting online surveys of 111 B2C and B2B2C executives with responsibility for IAM, Forrester found that new business and technical demands require a strategic focus for which existing IAM infrastructure may not be sufficient, and that there is a significant opportunity to utilize IRM-supportive technologies in support of customer-facing IT initiatives.

Download Now

Providing a secure and efficient Helpdesk

A single remote control platform for user support is be key to providing an efficient helpdesk. Users are spread across multiple LANs and mobile users connected over the internet. High levels of security are mandated at all levels of IT. User support, with the ability to take control of a user's PC and view the screen, is a particularly demanding situation. Protection of user privacy must be balanced by the need for privileged access, in accordance with compliance frameworks and legislation.

Download Now

Intelligent flash storage arrays

As data demands for performance and capacity rapidly increase, IT departments are challenged to deliver increased storage performance, scalability and capacity with the same effciency and costs. At the same time application workloads such as server virtualization, virtual desktops (VDI), online transaction processing (OLTP) and real-time analytics are further driving demand for storage infrastructure that can keep up. Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.

Download Now

Security for virtualized datacentres

As more and more corporations virtualize their infrastructures, security best practices must not be overlooked. The adoption of legacy solutions has proven inefficient due to the architectural differences between physical and virtual environments. Specifically, traditional software solutions have not passed the performance test when running on virtual machines.

This report outlines a solution that scans within a hardened Linux-based security virtual appliance, and also an extended range of operating platforms, including Windows, Unix and Solaris, in environments powered by any virtualization technology.

Download Now

Business security measures using SSL

Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. With secure socket layer (SSL) technology, organizations can enable secure communication, identity verification, and ultimately trust between businesses. However, information security is a multifaceted challenge that requires coordination of a variety of security measures to achieve comprehensive protection. This guide examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats, along with a discussion of practices for implementing a business-centric security management strategy.

Download Now


Terms and Conditions

By downloading any of the papers, or by watching for any of the live or on-demand events above, you agree that your supplied personal details will be passed on to the sponsor of the paper/event, and that this organisation may contact you in the future with further information about their products and services. You can request a stop to such communications at any time.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.