

This paper looks at the security challenges posed by employees working beyond the company's secure perimeter, and proposes a transition to a cloud-based security service.
Published: Apr 21, 2014


Some applications and data require additional security due to rigorous contractual or regulatory requirements. Until now, companies had to store sensitive data (and/or the encryption keys protecting it) in on-premise data centers.
Unfortunately, this either prevented migration of these applications to the AWS cloud...
Published: Nov 04, 2013


SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across almost every enterprise server and PC in your organization. Do you know how your SSH is being controlled? Here are some guidelines for a safer enterprise.
Published: Jun 25, 2014


This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments: agentless scanning using vShield Endpoint and client-based scanning optimized for virtual platforms.
Published: Mar 31, 2014


Virtualization is helping organizations utilize their data center hardware infrastructure more effectively, leading to reduction in costs, and improvements in operational efficiencies.
However, as organizations evolve from traditional data centers to virtualised and cloud computing environments, security architectures...
Published: May 03, 2017


The Data Center is rapidly evolving with recent trends such as Virtualization, Cloud computing, Software Defined Networks (SDN), and Network Function Virtualization (NFV). What are these new technologies and how they impact network security in the data center?
This whitepaper covers key concepts and overview of these...
Published: May 28, 2014


The 2018 cybersecurity reality is not favorable. The sophistication of cybermiscreants is growing rapidly.
A proliferation of security toolsets to combat the sophisticated cybermiscreants has resulted. The attack surface is larger; there are a growing number of environments and devices to protect as we witness...
Published: Feb 21, 2018


In today’s day of persistent and ongoing targeted attacks, the need to prevent and prepare for the eventuality of a security breach is of paramount importance.
More sophisticated threats, including targeted attacks, zero-day attacks and advanced persistent threats (APTs) are more commonplace and becoming harder...
Published: May 30, 2014


The corporate perimeter as you know it no longer exists. Virtual private network (VPN) vulnerabilities are pervasive, and outdated access solutions are not only cumbersome and time consuming, but also allow for unprotected access to enterprise networks and applications.
Management and IT practitioners have long recognized...
Published: Nov 13, 2018


This white paper, based on experiences gathered from more than 1,000 application control deployments, provides a blueprint that organizations can adopt to help ensure their own successful application control deployment.
It also outlines how Carbon Black’s unique trust-based approach and dedicated support of...
Published: Jan 11, 2019


As you move into 2015 endpoint security planning, prioritizing your initiatives can be time consuming. Last year analyst firm, Securosis, offered their thoughts on buying Endpoint Security Management solutions – including patching, configuration, device control and file integrity monitoring – which are increasingly...
Published: May 09, 2013


In this paper we’ll examine the inherent complexity of enterpriseclass security products and the very different needs of smaller organizations. Then we’ll look at a simpler alternative: cloudbased endpoint security.
Published: Apr 21, 2014


Symantec Code Signing creates a digital "shrink-wrap" for secure distribution of code and content over the Internet. Symantec Code Signing adds a level of trust by providing third-party authentication of the code signer, recognized worldwide.
Published: Jun 24, 2014


Advanced malware attacks can cause tremendous damage to an organization, from data loss through compromised identities to operations shutdowns. The cyber-criminals perpetrating these attacks are sophisticated, continuously adapting the latest exploits, and creating new and insidious methods of infiltration and attack....
Published: Jul 08, 2016