Cybersecurity

March 21, 2018

A study conducted by Ponemon Institute and sponsored by IBM Resilient found that 77 percent of respondents admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across their organization ...

November 14, 2017

More than 90 percent of respondents are concerned about data and application security in public clouds while nearly 60 percent of respondents reported that public cloud environments make it more difficult to obtain visibility into data traffic, according to a new Cloud Security survey ...

March 01, 2017

Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to a new study by Venafi ...

December 07, 2016

Unfortunately, most enterprise IT teams still monitor and manage user experience from traditional technology domain silos, such as server, network, application, device, operating system and security. As workloads continue to shift to new architecture, this approach only perpetuates an ineffective, costly and politically-charged environment. A unified approach allows IT teams to help their companies leverage technology investments to discover, interpret and respond to the myriad events that impact their operations, competitiveness, security and compliance ...

December 06, 2016

In an age where a deeper understanding of customers is a competitive necessity, the inability to effectively correlate, analyze and act on all operational data represents a significant missed opportunity to improve decision outcomes and financial performance. Whether it is customers visiting your website, your employees engaging with them through a SaaS CRM application, an authorized executive accessing sensitive corporate data remotely, or an investor researching your investor relations site, secure UX (user experience) that meets the user's expectations is the hallmark of the secure UX enterprise ...

June 16, 2016

In this blog I'd like to highlight one very critical area of AIA that came out in my research: the growing role of security as an integrated requirement for performance, change and capacity management ...

April 29, 2016

A majority (80 percent) of organizations receiving 500 or more severe/critical alerts per day currently investigate less than one percent of those alerts, according to new research from Enterprise Management Associates (EMA), sponsored by Savvius ...

April 08, 2016

Gartner, Inc. has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization's radar through the next two years ...

March 17, 2016

As technology continues to be a business differentiator and provide competitive advantage, tech budgets are increasing for almost half of organizations (46%), according to the annual Forecast Survey from Computerworld ...

March 15, 2016

In Part 2 of this blog, we highlight new regulations in the global securities industry that underscore the risks companies face when they don’t have a good handle on user experience or application performance across the application delivery chain ...

March 14, 2016

The PADS (Performance Analytics Decision Support) Framework recommends a more strategic approach to user experience and application performance. But deeper intelligence into the application delivery chain can also help companies meet compliance and security requirements more effectively in order to achieve their risk management objectives ...

January 25, 2016

BMC and Forbes Insights recently surveyed executives in North America and Europe to get their perspective on their organization's overall security health and to find out what issues are critical to address. The results revealed the need for a framework organizations can use to get a solid strategy in place for improved security and compliance ...

December 12, 2014

Most security experts agree that the rapidly changing nature of malware, hack attacks and government espionage practically guarantees your IT infrastructure will be compromised. Once an attacker is within the network, it can be very difficult to identify and eliminate the threat without deep-packet inspection. The right APM solution that includes network forensics can help IT operations deliver superior performance for users, and when incorporated into your IT security initiatives, deep packet inspection can provide an extra level of support to existing antivirus software, Intrusion Detection System and Data Loss Prevention solutions ...

November 18, 2014

Security breaches are common today – from computer viruses, such as Bash Bug or Heartbleed, undermining the security of millions of websites, to credit card cyber theft experienced by big retailers. One effort to protect cardholder information is Payment Card Industry (PCI) Data Security Standard (DSS), which is applied wherever cardholder data is stored, processed or transmitted. APM designed to capture and retain network application transaction data has the potential to violate compliance. Below is an outline of the 12 requirements to be PCI DSS-compliant and how to manage APM to avoid violations ...

February 22, 2013

Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner, Inc.

February 12, 2013

In the face of an ever-evolving cyber security landscape, researchers at Radware have identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat ...

January 07, 2013

Most security reference architectures rely on the old methods to get warnings about security issues such as use of a SIEM and a log analysis tool to interpret what is in the SIEM. However, there is a richer set of more immediate data that can help us with the problem of security notifications: APM Data ...

November 16, 2012

Despite the increasing sophistication and severity of cyber attacks, a survey of more than 700 senior IT professionals reveals that organizations are surprisingly unarmed to deal with today’s threat landscape.

October 22, 2012

In recognition of National Cyber Security Awareness Month (NCSAM), Lancope offered 5 tips for improving enterprise network protection ...

October 08, 2012

HP unveiled new research indicating that the cost and frequency of cybercrime have both continued to rise for the third straight year.

September 24, 2012

The Cloud is not only disrupting the way in which organizations acquire and utilize computing power and business applications, it is also changing the way application development and IT operations teams view their roles and the tools they use to perform their responsibilities. Certainly, this site is clearly illustrates how the idea of APM is changing in light of the rapid adoption of Cloud solutions ...

September 14, 2012

In many organizations, security operations work in siloes to IT Operations. As a result, security vulnerabilities have to be handled twice: once by the SOC groups or security teams, and secondly by the IT Operations team who could not initially identify the issue. Consequently, you cannot establish any automation for information sharing or event correlation between security vulnerabilities and performance issues. Here are 10 tips for efficient SOC/NOC collaborate ...

Pages