T.E.N. Knowledge Base


ISE® Lions' Den and Jungle Lounge

What CISOs Need to Know About Cloud Computing > Download Whitepaper
There is no question cloud computing is fundamentally changing how we deliver and consume technology resources, but the main impacts to security are not outsourcing or sharing infrastructure with others. Cloud computing doesn’t necessarily reduce security risks, it shifts them. Cloud computing is a radically different technology model – not just the latest flavor of outsourcing. It uses a combination of abstraction and automation to achieve previously impossible levels of efficiency and elasticity. But in the end cloud computing still relies on traditional infrastructure as its foundation.

Threat Model for Mobile Applications > Download Whitepaper
Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes, and so on. Due to its multiple dimensions and compact size, the threat landscape differs for mobile apps as compared with web or client/server apps. This difference is driven by the fact that mobile apps have access to certain data types never available on web apps, such as call history, SMS logs, contact lists, geo-location, etc. Thus, due to different (and more sensitive) data exposures, developers need to build mobile applications with these new threats in mind. This paper is a brief overview of the new and changing threat model for mobile applications, and their emerging attack surfaces.

Cloud Under Control: How to Virtualize More by Virtualizing More Securely > Download Whitepaper
Enterprises have reached an inflection point. The value of datacenter virtualization is undeniable: cost savings, efficiency, and business agility are all driving organizations to virtualize more. However, many companies reach a security roadblock when it comes to virtualizing mission critical or Tier-1 applications. Breaches or accidental misconfiguration can have catastrophic consequences in these concentrated infrastructures, and security officers are right to be concerned. But the good news is that it is possible to maintain compliance and security, while reducing the chance of datacenter failures, even when virtualizing mission critical applications. HyTrust virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure and data breaches — especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications.

The 5 Steps to Cloud Confidence  > Download Whitepaper
The time is now for you to discover the apps running in your environment and enforce policies to make them safe, compliant, and high performance. This whitepaper is the step-by-step playbook to confidence about the cloud apps in your organization so you can eliminate the catch-22 between going fast and being safe.

Ponemon Institute LiveThreat Intelligence Impact Report 2013  > Download Whitepaper
This comprehensive study of 708 respondents from 378 enterprises reveals the financial damage that slow, outdated and insufficient threat intelligence is inflicting on global enterprises and how live threat intelligence provides the ability to better defend against compromises, breaches and exploits.

Strangers in Your Servers: Make Working with IT Contractors More Secure  > Download eBook
Nearly 90% of data breaches are accomplished via remote access to a company’s systems. Yet, third-party service providers are routinely given wide-ranging remote access privileges – and companies have no idea what these vendors are actually doing once they are logged in. There is a better way to keep track of what these vendors do: User Activity Monitoring.

Enterprise Executives and Consumers Lack Confidence About Cybersecurity  > Download Whitepaper
Enterprises are concerned that their organizations may be vulnerable to targeted malware attacks and Advanced Persistent Threats, but many are not taking the proper precautions to prevent cybercrime from occurring. In addition, many consumers don’t believe that enterprises are doing enough to protect their personal data, underscoring the need for enterprises to rethink their cyberdefense strategies and pay more attention to their customers’ security concerns.

Reinventing Network Security  > Download Whitepaper
Organizations are under constant attack from high-volume opportunistic threats and the less-frequent, but highly targeted attacks. Damage ranges from a nuisance to operational disruption to the theft of high-value information. For decades, prevention-centric security has been the answer, but its efficacy has fizzled in the face of more advanced attacks. The reality is that adversaries are already inside most organizations’ networks, and security operations teams are often blind to these incursions.

Vectra’s platform delivers real-time detections of advanced cyberattacks by continuously monitoring the network. Vectra reports real-time insights into each stage of a cyber attack, providing multiple opportunities to prevent or mitigate loss, with next-to-zero operational cost. Vectra achieves this differentiation by leveraging inflection points in data analytics, machine learning and next-generation computing technology. The platform can detect attacks on any operating system, application, device and browser.

Read this whitepaper to learn how Vectra’s cyber-security thinking machine continuously listens, thinks, remembers and anticipates the next move of an attack in real time, giving IT the insight to stop attacks, even while they are happening.