REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Advanced Attacks Demand New Defenses

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It’s scary stuff, and ­ignorance is definitely not bliss. How to fight back? Think security that’s distributed, stratified, and adaptive. 

Best Practices: WLAN Management

Best Practices: WLAN Management

We've come a long way in the past decade, from, "Look Ma! No wires!" to 802.11n networks that promise to eventually deliver 600 Mbps throughput. For now, most of us are muddling along somewhere in between, with an alphabet soup of 802.11a/b/g/n devices and a jumble of supplicants. Here are 10 pitfalls inherent in managing these mixed networks, and how to dodge them.

Bank Systems & Technology Digital Issue: September 2010

Bank Systems & Technology Digital Issue: September 2010

MASTERING OUTSOURCING: This special digital edition of Bank Systems & Technology takes an in-depth look at the strategic (and controversial) practice of outsourcing. Even as unemployment in the U.S. hovers near 10 percent, bank IT outsourcing has been on the rise. But these aren't yesterday's outsourcing deals; banks are demanding -- and getting -- more value from their outsourcing partners. INSIDE: Taking Control of Outsourcing, 5 Hot Outsourcing Destinations, The Real Economics of Outsourcing, and more ...
Wall Street & Technology Digital Issue: September 2010

Wall Street & Technology Digital Issue: September 2010

GETTING RISK RIGHT: This special digital edition of Wall Street & Technology takes an in-depth look at the new era of risk management on Wall Street. Chief executives, CIOs, risk managers and regulators have been searching for solutions to help solve the Street's risk management challenges. But the answer may be right under their noses; it may be as simple as solid enterprise data management and business intelligence. INSIDE: Can EDM and BI Help Solve Wall Street's Risk Woes?, Exclusive Research -- The State of Analytics in Financial Services; Wall Street to Boost Analytics Spending to Improve Risk Management, and more ...
Strategy: E-Mail Encryption

Strategy: E-Mail Encryption

You need a way to keep users from e-mailing confidential data outside the confines of the organization, but conventional, PKI-based client mail encryption can be costly and complex. Fortunately, on-premises and cloud-hosted gateway systems provide increasingly appealing alternatives. In this report, we???ll explore ways to plan, deploy and manage a reliable, cost-effective and scalable e-mail encryption system to ensure your organization???s regulatory compliance and business data protection.