White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.

5 Arguments to Justify Your Identity Spend

Spending on secure infrastructure is vital to protect any company’s plans for revenue generation and business expansion, but all execs are faced with competing revenue-generating priorities across the business. When it comes to identity spend—which today make up less than 9% of the average security budget, despite its potential to prevent the 80% of data […]

Key Methods for Managing Complex Database Environments

As database infrastructures become more complex, you must adapt and learn to balance key business metrics, understand new technology challenges and find the right tools to  monitor and manage your database environment. This white paper describes key methods to successfully manage your complex database envrionment. A slow relational database can substantially impact the performance of […]

An Introduction to Advanced Malware and How it Avoids Detection

Despite millions being spent on security products, organizations are still suffering from advanced malware attacks and data breaches. Attacks continue to succeed because the malware has been engineered to detect and evade “advanced” or “next-generation” tools like firewalls, sandboxes, and IPS. Organizations interested in safeguarding their data need to understand how evasive malware behaves and […]

Mitigating Business Risk and Driving Business Value with Behaviour-Based AI Security

Artificial intelligence (AI) has emerged as a prominent technology in cybersecurity applications. This IDC Vendor Spotlight examines the advances in and recent uses of AI in cybersecurity as well as the role of Lastline in this important market.  The report offers an evaluation of AI-powered security capabilities that is required to understand what the technology […]

Protecting GPS Systems Against Spoofing and Jamming Threats

Critical infrastructure sectors such as wireline and wireless net­works, power grids, data centers and emergency services are now highly dependent on PNT information delivered by GPS. This brochures describes how Microsemi’s BlueSky GNSS Firewall solves the problem of protecting already deployed systems by providing a cost-effective overlay solution installed between existing GPS antennas and GPS […]

GNSS Security for PNT Applications

To guide operators of Critical Infrastructure sectors such as communications, energy, transportation, emergency services, financial services, and cloud data centers, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) have described a number of steps that can be taken to mitigate outages and disruptions with GPS reception, thus improving its PNT (position, navigation, […]

Prioritization to Prediction Measuring What Matters

What matters in vulnerability management (VM)? What enables some programs to achieve higher levels of performance and greater success than others? Is it what they say (e.g., policies) or the products and tools with which they play? Does everything hinge on what they do or how they do it? Is it all about what they […]

Go Beyond Application Vulnerability Correlation

What It Takes to Move to Risk-Based Application. Vulnerability Management In the current application software development life cycle, using more than one  application security testing tool is a necessity, due to their different strengths and  weaknesses. Gartner sums up the need for multiple testing tools extremely well when it says, “Some vulnerabilities can be found […]

Zero Trust Internet Is the Answer for 100% Email and Web Security

How many times have you heard the phrase, “It’s not if, but when”? The saying can easily  be applied to the inevitable failure of a company’s cybersecurity defenses, and it’s  surprising how widely accepted this view is. Cybersecurity defenses are designed to  identify threats and then prevent them. This strategy is imperfect, however, because   there […]

British Bakels – A Cristie Data case study

British Baking Manufacturer’s Storage Infrastructure Innovation British Bakels is one of the leading suppliers of ingredients to the bakery market in the UK. It manufactures ingredients and develops new baking concepts to help major artisan, retail and industrial bakers improve their products. The company was running on HPE Storage which had worked well, but had […]