A Brief Update on Hadoop

This eBook will explain what Hadoop 2.0 brings to the table, the impact Hadoop is having on large scale computing, and why you might want to consider using a full-fledged cluster management solution to build, manage, and maintain your Hadoop clusters.Y…

How to Beat the Breach (BYOD and HIPPA Breaches at Hospitals)

Providing high-quality healthcare is a science—but securely managing the expanding amount of highly personal healthcare content can be an art. As the already-large volumes of healthcare-related data continue to grow, many organizations are turning to the cloud to store, manage and share data. When looking at ways to better share documents and files across healthcare organizations, IT and Security professionals need a cloud-based content management and collaboration platform that offers enterprise-grade security.

Box is a HIPAA compliant collaboration platform that allows employees to share documents within their organization and with partners and clinicians outside their organization. Box signs Business Associate agreements with its healthcare customers and offers the following product and security features:

  • Data encryption at transit and rest
  • Full audit trail for users and content
  • Strict access to files and seven levels of permissions
  • State-of-the-art practices for identity management
  • Mobile device management
  • Reporting and analytics to get up-to-the-minute information on what’s happening with a customer’s content
  • SSAE 16 Type II and SOC1 and SOC2 certified

Request Free!

The Analytic-Transactional Data Platform: How to Enable the Real-Time Enterprise

With the ever-increasing volume, variety, and velocity of data coming at enterprises today, business needs to act fast. It’s never been more critical to exploit data and make strategic decisions in real time.

Join Carl Olofson, research Vice President for database management and data integration software research at IDC as he discusses:

  • His research that reveals how “decisions must be driven in operational applications that blend transactions and analytics against a single data collection with very low response times”
  • Learn how this approach can reduce data footprints, streamline IT operations, and simplify technology landscapes, while allowing for greater speed and agility to create new opportunities
  • Hear how SAP and Intel have improved transaction processing performance in support of an analytic-transactional data platform and are driving new technology that can bring together both transaction and complex query processing in a single database platform

Register today to learn how you can exploit real-time data to unlock business value!

Request Free!

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions (FREE eBook) Usually $48.99

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it’s packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.

  • A unique book on credit and debit card security, with an emphasis on Point-to-Point Encryption of payment transactions (P2PE) from standards to design to application
  • Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO
  • Explains how protected areas are hacked and how hackers spot vulnerabilities
  • Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

Request Free!