REGISTER

SecuritySCTN pdf Download (535 KB)

2016 was the year of massive data breaches, from LinkedIn and Dropbox’s resurfaced breaches to Yahoo’s massive breach and others, where over half a billion accounts, records, and passwords were leaked. This year, Soha Systems also found that 63% of data breaches were directly or indirectly linked to third-parties. As more and more sensitive data is released to hackers and other malicious actors, targeting a third-party to reach a larger organization becomes an easier task to fulfill. How can you be sure you’re taking into account the current security risk posture of your third-parties?

IDERAtn pdf Download (3.61 MB)

Clear guidance on best practices for managing tempdb to provide the optimum balance between performance, reliability, and manageability.

HPE default Download

Protecting personal data has been an important issue in the European Union (EU) for more than 20 years, and the recently ratified General Data Protection Regulation (GDPR) takes data protection to an entirely new level. In addition to a new set of legal requirements that necessitate both organizational and technological responses, the GDPR is applicable to almost every organization around the world that collects or processes data on residents domiciled within the EU, including permanent residents, visitors and expatriates. Compliance is thus predicated on the geographical location of the individuals about whom an organization holds personal data, not the domicile of registration for the organization.

IDERAtn pdf Download (2.15 MB)

SQL Server provides robust capabilities to monitor itself and it can be easy to be overwhelmed with the choices presented through catalog/dynamic management views, extended events, server side traces (for older versions of SQL Server), or performance counters. This is true on the security side as well. In this whitepaper we’ll present the top five items you should be auditing on all of your SQL Servers, and how to do them. Keeping an eye on these items will help you verify database security and access in your environment.

HPE default Download

Hadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance, and scalability are unprecedented. But data security was not the primary design goal.

IDERAtn  pdf Download (144 KB)

Being in the computer industry is one of the most challenging things anyone can get into. When upgrading one’s knowledge to keep the data secure, there are a number of hurdles to cross. In this industry where we look for quick, fast responses from development to deployment to sales, everyone is expected to deliver without compromising any of the business parameters.

HPE pdf Download (342 KB)

With the influx of big box stores and national retail chains, many small to medium-sized merchants are finding it increasingly difficult to compete. Few of these locally owned, often family-run businesses have the budget or technical resources to build their own inventory management, supply chain, point-of-sale, or other sophisticated systems like the big players have. That’s why more than 5,000 leading mid-market retailers turn to Epicor.

HPE pdf Download (445 KB)

Hewlett Packard Enterprise (HPE) engaged Coalfire Systems Inc. (Coalfire), as a respected Payment Card Industry (PCI) Qualified Security Assessor (QSA), to conduct an independent technical assessment of their HPE SecureData Payments solution. Coalfire did not conduct technical testing for this assessment. The assessment was to identify the potential impact to the number of PCI DSS 3.2 controls applicable to merchants using encryption solutions based on HPE SecureData Payments.

IDC pdf Download (184 KB)

GRC is a vital but complex component of business operations for many organizations. IDC’s study shows that organizations can reduce their organizational risk while achieving significant value in terms of GRC operational efficiencies with RSA Archer.

RSAlogoNEW1 pdf Download (6.66 MB)

This whitepaper gives deeper insight into how RSA’s vision of a Business Risk Management platform takes GRC capabilities into the next generation with the ability to translate any risk into actionable intelligence to improve business decisions.

RSAlogoNEW1 pdf Download (3.40 MB)

The countdown has started. The European Union’s General Data Protection Regulation goes into effect in less than a year. Even if your company does not do business internationally, you might well have to adjust your GRC policies and procedures to comply with GDPR, since your business partners probably will be GDPR-compliant.

Gartner default Download

For the third consecutive year, Gartner® placed Dell Technologies (RSA) in the LEADERS quadrant of the 2016 Magic Quadrant for Operational Risk Management Solutions.

Forrester pdf Download (364 KB)

This Forrester Research report explains how to use performance management to help improve your risk and compliance functions, while aligning them to business strategy and overall goals.

RSAlogoNEW1 pdf Download (3.40 MB)

Organizations need to understand their cyber risk in business terms so they can make informed decisions regarding the type and amount of cyber risk they should take on. View the ebook to calculate your risk appetite.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *

Banner

MetricStream TPRM

Banner

Banner

Banner

CyberBanner

MetricStream TPRM

CyberBanner

Go to top