Executive Resources

Trends for 2011: Botnets and Dynamic Malware

Source: Eset
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security.



Related content:

Are Your Legacy Applications Suitable for the cloud? 3 Critical Evaluation Activities to Ensure Migration Success

Many enterprises are currently planning or are in the process of migrating their critical business applications to the cloud as the trend toward the hybrid enterprise continues to gather momentum. Even if a legacy application is deemed technically possible to migrate, without understanding the cost to the business and the performance ramifications for end users, the impact could be disastrous. Here are some factors that should influence cloud migration decisions for legacy applications.

Agile Data Masking: Toward a More Secure and Agile Enterprise

Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. This white paper explores how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.

Keeping Up with Production: How Agile Data Management Speeds Time to Market

Software development across industries is undergoing a constant revolution, driving toward more efficient processes, while data management is trapped with slow legacy systems. This document from Gleanster outlines how data as a service transforms data from drag to driver.

Agile Data Masking: Critical to Data Loss Prevention and Threat Reduction

Over the past several years data loss and data leaks have been a regular part of headline news. This surge in data leak activity has prompted many organizations to reevaluate their exposure to data leaks and institute automated, agile approaches to data masking. Well-implemented data masking secures data delivery and enhances compliance and security while accelerating data management processes.

Top 10 Evaluation Criteria for Copy Data Management & Data Virtualization

Data virtualization is becoming more important, as industry-leading companies learn that it delivers accelerated IT projects at a reduced cost. With such a dynamic space, one must make sure that vendors will deliver on their promises. This white paper outlines 5 qualification questions to ask before and during the proof of concept (POC), and 5 things to test during the POC.