All White Papers

Resources available: 1548

eBook: Securing Business Information in the Cloud

For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.

Top 5 Truths About Big Data Hype and Security Intelligence

With the explosion in security data, Big Data security analytics (BDSA) is widely acknowledged as the future of security information and event management (SIEM). But BDSA is a specialized application of Big Data. This study shows how BDSA is different: - There's more to BDSA than just "big."...

An Alternative to Today's Distributed Content Security Chaos

Many enterprise organizations have sensitive files stored cross the enterprise using a variety of technologies and security controls. As bad as this is, environments are actually getting worse as today's complex IT architecture is expanded with cloud and mobile computing. Addressing this problem with...

SANS Security Analytics Survey

The volume of log and event data that security managers must sort through to find evidence of cyber attacks is escalating-beyond the capabilities of existing log management and security information and event management (SIEM) solutions to collect and analyze. This SANS Analyst survey asked 647 security and...

Ponemon WW Report

According to the Ponemon Institute's 2013 Cost of Cyber Crime study, the average cost to businesses of cyber crime is more than $7M per year-a 30% increase over last year. And the average number of attacks per company grew 20% to 73 successful attacks annually.With the incidence and cost of cyber crime...

Securing Business Information in the Cloud

Since the rise of the client-server model, IT has steadily moved from a centralized computing model to a highly decentralized one. This shift has dramatically accelerated in the last several years, fueled by mobility, cloud services and service-oriented platforms. This has created immense value for IT and...

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight-a Security Information and Event Management (SIEM) solution from HP-applies these techniques to spot and stop attacks.

State of Security Operations 2014

As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOCs) to detect and counter cyber attack and to assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement? HP...

Splunk Boosts Day-to-Day Operational Intelligence, Secures its IP with Box

Known for extracting meaning and 'operational intelligence' out of mountains of customer machine data, San Francisco-based Splunk knew it had a challenge. The big data software company needed a better and more secure way to track its intellectual property (IP). Previously, Splunk's documents...

2014 Trends That Will Reshape Organizational Security

No predictions are perfect, but the most useful ones provide insight into meaningful events that are likely to happen, rather than indicating what should happen. This report provides the background, rationale and advice for realigning organizational security in light of the evolving cybersecurity and...

©1994-2014 Infoworld, Inc.