White Papers by Topic: Security

Resources available: 200

Evaluating HITECH's Impact on Healthcare Privacy and Security

In this HIMSS Analytics report, 52% of large hospitals report being breached in the previous year. The HITECH Act demands privacy for patient data. However, with today's advanced threats - more than privacy is in jeopardy. Modern malware can impact the integrity of medical systems and put patient safety at risk.

Bit9 Parity Suite vs. Windows 7 AppLocker

In Windows 7, Microsoft introduces AppLocker, a feature intended to protect endpoints from malware.
Learn how it stacks up to Bit9's best in class Application Whitelisting solution in this Microsoft MVP-authored whitepaper:

*Avoid catastrophic side effects, accidental lockdown
*Eliminate unauthorized software from video games to zero-day attacks
*Build an application whitelist fit for the largest enterprise

Beyond PCI Compliance

Point-of-sale systems are often targeted by hackers looking to destroy a company's reputation and steal credit card data. Learn how this one-time corner store - now part of the world's largest food retailers - used Bit9's award winning Application Whitelisting solution to eliminate the threat of unauthorized and malicious software, satisfy PCI DSS requirements, and save millions in capital expenditure costs.

Application Whitelisting Puts Behavioral HIPS in the Recycle Bin

Traditional host intrusion prevention approaches have proven to be ineffective against advanced threats and modern malware. Bit9 invites you to read this Ogren Group whitepaper to learn why analysts recommend Application Whitelisting as foundational for endpoint security to:

* Protect against new advanced threats
* Find and detect malware
* Build dynamic, real-time whitelists

How to Tell If You Need Secure, Managed File Transfer

If your organization is like most, you probably move more than a few files from place to place. With all this data flying around, how secure are your file transfers? This shortcut guide examines three real-world file transfer scenarios and provides the 10 business requirements you need to fulfill with any file transfer solution.

Common File Transfer Myths - Debunked

Misconceptions and bad assumptions related to file transfer are common. This paper will bust some of these myths by examining common misunderstandings, explaining where they came from-because many of them do, in fact, contain a nugget of truth-and seeing how they hold up to cold, hard facts.

Creating Your File Transfer Shopping List

Although many managed file transfer solutions are similar in basic capabilities, each solution offers unique features that, depending on your needs, may be advantageous or disadvantageous to your organization. This paper will examine specific business requirements that you may have and translate those to the technical requirements of a file transfer solution.

Protecting personally identifiable information

Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business's reputation, and even lead to criminal prosecution, because of complex and frequently changing regulations. This white paper examines the challenges organizations face and the steps they can take to protect themselves and their customers against data breaches and ensure the safety of this sensitive information.

Five tips to reduce risk from modern web threats

User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today's web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

Web security buyers guide

Web interactivity increasingly relies on user- and third-party-generated content built on rich backend database systems, which are easily exploited. This has created a breeding ground for the distribution of malware-even among the most trusted and popular web sites and applications. This dramatic change in the nature of web threats has rendered traditional web filtering technology completely ineffective. Simply blocking access to sites that may host malware is no longer a viable solution - as that would now include each and every site on the net. Read this buyers guide to learn what to look for when evaluating web security solutions.

©1994-2014 Infoworld, Inc.