Security considerations when undergoing a network refresh

Corporate networks are under a constant state of siege - not just from threats but from the pressure of supporting the ever-growing number of clients, devices and platforms that have resulted from the BYOD phenomena. Network demands will only increase as we move to the "internet of things" adding sensors and instrumentation of all types to the list of security burdens.

As a result, many organizations are planning network refreshes to ensure bandwidth for current and future needs will be available. But new networking protocols and hardware can bring new attack surfaces for both internal and external threats, and organizations must consider new security measures, from intrusion prevention systems to next-generation firewalls to ensure network upgrades don't leave them at higher risk.

This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities.

View Now

Six Things that Can Kill your Website and How to Stop Them

Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped coming. This is why website security is so important.

This white paper explores six threats to your website and what you can do to prevent them - website malware, malvertising, search engine blacklisting, security warning and expired certificates, brand impersonisation (phishing) and customer security concerns.

Get Whitepaper

Beginners Guide to SSL

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. It is important to understand the potential risks and then make sure you are fully protected against them. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Get Whitepaper

The Power to Destroy: How Malware Works

Nearly a quarter of IT managers simply don’t know how secure their website is. However, with the number of web-attacks blocked per day rising year over year, it's vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. As a website owner it’s your responsibility to not only protect your business and customers, but the safety of the Internet too. Register now to read more about how you can protect your business and your brand from infection.
Get Whitepaper

Knowledge is Power: Guide to Protecting Your Website

In 2012 Symantec performed more than 1,400 website vulnerability scans each day. More than half the websites scanned were found to have unpatched, potentially exploitable vulnerabilities. Of the vulnerable sites, one quarter were actually infected with malware that could infect visitors and lead to the sites being blacklisted by search engines. These figures show that millions of legitimate websites are at risk from serious attack and exploitation by internet criminals every day. Download this white paper to learn more about how you can protect your site with proper security and monitoring.
Get Whitepaper

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions

With the escalating number and increasing sophistication of cyber attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don’t open doors for hackers. Mainstay surveyed 12 organizations that implemented application vulnerability testing with HP Fortify.

Their findings: HP Fortify customers reduced application vulnerabilities from hundreds to tens, the average time to fix them from weeks to hours, and time-to-market delays due to vulnerabilities from 120 days per year to none. And companies who used HP Fortify on Demand-a cloud-based solution-saw results and achieved time to value faster. Read the report to learn how.

Get Whitepaper

Why you need a next-generation firewall

Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations to incorporate full-stack inspection to support intrusion prevention. This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations.
Get Whitepaper

IDC Spot Light – HPArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months-far too long. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management.

Within six months Finansbank was able to use HP ArcSight ESM to authorize transactions in near real time. Using its flexible rules engine and advanced correlation, they reduced false positives by 90% and the time to resolve flagged transactions by 80%. Read the report to learn how.

Get Whitepaper

SSL 101: A Guide to Fundamental Web Site Security

As use of the internet has grown, the web has also become more popular with scammers, identity thieves, and other cybercriminals. Fortunately there is SSL, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. In this guide, you'll learn about what SSL does, how it works, and how it can help build credibility online.
Get Whitepaper

Choosing the Right Security Solution

This paper discusses how online businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Get Whitepaper

State of security operations 2014 report of capabilities and maturity of cyber defense organizations

As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOCs) to detect and counter cyber attack and to assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement?

HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry. Read it to understand: Areas needing the most improvement; Lessons learned; and Recommendations on target maturity levels for enterprises and managed security service providers.

Get Whitepaper

Securing your IT Infrastructure with SOC/NOC collaboration

This white paper explains why integrating your log management solution with IT operations is beneficial to both your network operations center (NOC) and security operations center (SOC). It can help you seamlessly integrate log management into your IT operations strategy, create collaboration between your SOC and NOC that empowers your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Get Whitepaper

10 Ways to Build a Better Big Data Security Strategy

When it comes to enterprise security, Big Data is part of the problem-and it is part of the solution. Collecting vast amounts of data from disparate sources-including the cloud-exposes the enterprise to new threats and creates vast new stores of data you must protect. But you can apply Big Data techniques for finding insight in mountains of data to find security threats as well.
View Now