You've requested...

Share this with your colleagues:

Download this next:

Establish proactive IT hygiene to prevent attacks with VMware Carbon Black

Proactive analysis of potential security risks plays a critical role in an organization’s threat readiness. Unfortunately, due to limited resources, these preventative measures don’t happen as frequently as they should.

In this datasheet, explore the key capabilities of VMware Carbon Black Cloud Audit and Remediation, designed help organizations maintain their IT hygiene by enabling them to:

  • Assess vulnerabilities in real time
  • Prove & maintain compliance
  • Audit & protect production workloads
  • & more

These are also closely related to: "AppDetective"

  • Who should get the technology vote in the UK General Election?

    In this week’s Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties’ election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology.

  • Web-facing applications: Security assessment tools and strategies

    Businesses continue to create web applications that offer improved access to information. Unfortunately, this online presence has created an area that’s vulnerable to security threats and web application security assessments that often fall short.

    Consult this expert E-guide to learn more about properly discovering web application threats. Discover the tools you need for protection and how you can mitigate likely threats by consulting this resource now. 

Find more content like what you just read:

  • 8 risk management best practices for PAM

    Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.

    Download

  • 6 best testing practices for API security

    API security is often overlooked. As it turns out, APIs face many of the same insecurities as web applications. So why are the security strategies for APIs vs. web apps so lopsided? This guide includes the 6 best testing practices your organization can adopt to ensure API security. Read the guide now.

    Download

  • The benefits of Contrast Assess Route Intelligence

    Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.

    Download

  • How you can help DevOps manage & triage hidden OSS library risk

    Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.

    Download

  • What are your options for web application security?

    How confident are you in your web application security? Many organizations are turning to cloud-based SaaS security platforms. These solutions are scalable, assess vulnerabilities, and scan continuously. With a SaaS security platform in your toolkit, your organization can face risks with confidence. Read this datasheet now to learn how.

    Download

  • E-Guide: Database Tools for Auditing and Forensics

    This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.

    Download

  • How to build a successful PostgreSQL security framework

    Securing your PostgreSQL database is a multifaceted undertaking that involves evaluating everything from physical security to authentication protocols. Read this EnterpriseDB white paper to learn PostgreSQL security best practices as well as how to implement them in your own database.

    Download

  • How to establish security in your complex database environment

    While the primary goal of databases like MongoDB is to make data accessible and easy to work with, it would be pointless to have a database that is perfect to keep data on and vulnerable to cyberattacks at the same time. Read on to learn how MongoDB was able to build security into their scalable, accessible database.

    Download

  • CAST's Cloud Readiness Assessment

    CAST’s Cloud Readiness Assessment can help your team assess the cloud readiness, health, and open source risk for every application in your portfolio. Learn more about the Cloud Readiness Assessment here.

    Download

  • Proactive Security: Software vulnerability management and beyond

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

    Download

  • Virtual database patching—stop zero-day exploits

    Many DB professionals find that traditional database security patching methods are slow, complex, and ineffective. Read this datasheet to learn how Rimini Street Advanced Database Security offers virtual database patching, accelerating patches, eliminating the need for costly regression resting, and stopping zero-day exploits before they happen.

    Download

  • Proactive Security: Software vulnerability management and beyond

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

    Download

  • Creating a Multi-layered Secured Postgres Database

    Creating a database with multiple layers of security isn’t easy; and in today’s world of malware, strict data regulations, and cybercrime, data security is more important than ever. Watch this webinar to learn how you can create a multi-layered security architecture for your Postgres database, with authentication, authorization, auditing, and more.

    Download

  • Creating better Postrges database security

    When it comes to the mission-critical and often sensitive workloads you run on your databases, nothing short of the best security should be accepted. Watch this video to learn how you can create a multi-layered security architecture for your Posgres database, with features including authorization, authentication, and auditing.

    Download

  • How to combat cross-site scripting (XSS) attacks

    Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.

    Download

  • How to better manage your database licensing

    For many database administrators, projects that they hoped would simplify operations or push down cost have done the opposite. On top of that, customer audits often add to the headaches. Read this infographic to learn how PostgreSQL can slot into your current database architecture to help to solve these problems and reduce licensing complexities.

    Download

  • Hands-on Oracle Application Express security

    This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code.

    Download

  • Automated Breach and Attack Simulation: Webcast

    View this Frost & Sullivan webinar to learn about the benefits an automated breach and attack simulation.

    Download

  • Automated Breach and Attack Simulation: Podcast

    Listen to this Frost & Sullivan podcast to learn about the benefits an automated breach and attack simulation.

    Download

  • Unifying IT operations & IT security imperatives: Ivanti solution brief

    This solution brief provides an overview of the key features and capabilities of Ivanti’s patch management offerings, designed to bridge the gap between IT operations and IT security teams – enabling them to collaborate and achieve their common goal: to secure and enable the business.

    Download

  • The state of application security testing

    The Application Security Testing (AST) market has evolved quickly as organizations scramble to secure their cloud native and modernized applications. This Gartner Magic Quadrant assesses which vendors are leading the AST market right now, and what technologies are setting these providers apart.

    Download

  • The future of databases in APAC

    In this e-guide, read more about the promises of autonomous databases, why relational databases are poor at running digital transformation projects, and why Amazon Web Services decided to switch off its Oracle data warehouse.

    Download

  • How to assess your IT security risks in healthcare environments

    In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.

    Download

  • Analyst's take: Independent software vendors save money with DataDirect drivers

    Independent software vendors (ISVs) that embed DataDirect drivers can leverage DataDirect’s expertise to improve data connectivity.  Using DataDirect helps them reduce cost and risk so they can focus on innovation and competitive advantage.

    Download

  • ASD/ACSC maturity model: How to get to level 3

    The Australian Signals Directorate (ASD)/Australia Cyber Security Centre (ACSC) breaks down their model into a 3-level self-assessment in order to help organizations on their journey towards maturity. In this article, discover 3 simple things to check for your level 3 maturity self-assessment.

    Download

  • Consolidating databases: Why it’s important, and how it’s done

    Databases are essential for nearly everything, from mission critical operations to AI and ML training. But database infrastructure can become sprawling and fractured, limiting governance and efficiency. Read this e-book to learn how you can consolidate Oracle databases and improve your database ecosystem.

    Download

  • How to handle requirements for risk assessment methodologies

    Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization.

    Download

  • Protecting sensitive data in and around an Oracle database

    When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.

    Download

  • Expose vendor audit risks: Here's how

    As the number of cloud platforms and subscription-based licenses continue to rise, many organizations existing software auditing capabilities are no longer good enough. Tune into this webinar to learn how to identify and manage audit risks within your organization’s software portfolio.

    Download

  • CW Buyer's Guide: infrastructure on demand

    This 10 page Computer Weekly Buyer's Guide offers advice for organisations looking at infrastructure on demand in the cloud.

    Download

  • Learn what virtualization metrics matter for databases

    What impact does virtualization have on database instances? Find out what VMware metrics matter with SolarWinds’ new whitepaper that provides a guide for DBAs to determine the impact, if any, of virtualization on database performance.

    Download

  • Encryption key management for SQL Server & Oracle DB

    If your enterprise uses Microsoft SQL Server and/or Oracle DB, read this data sheet about encryption key management from Thales. Centrally managing your keys independently from your database applications may help you streamline operations, fulfill compliance mandates and better protect your sensitive data.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • 5 considerations before buying backup software

    Download this e-guide to learn how to assess your data protection needs, discover 5 considerations before buying data backup software, and much more.

    Download

  • Enabling cloud-native Cassandra app development with the right database

    You likely want to enable instant developer access to all necessary data, whenever it’s needed, without compromising security. Watch this short video to learn how DataStax’s cloud native, scalable database is built on Apache Cassandra to enable better performance, higher availability, and easier database accessibility for developers.

    Download

  • Isolating database issues across your complex environment

    These days, database issues, ones that often affect applications, are not so straightforward to identify. Is the issue in the database, or your cloud service, or your virtual machine, or something else? Examine Solarwinds’s portfolio of solutions to see how they help you understand the full breadth of your database infrastructure.

    Download

  • How to implement a successful application security program

    Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.

    Download

  • Virtualisation therapy for your disaster recovery plan

    We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

    Download

  • Securing your code for GDPR compliance

    To help bridge this gap, use this GDPR checklist for how to secure databases combined with best practices in AppSec from PCI DSS, and expand those ideas, checks, and balances into a full application checklist for developers.

    Download

  • A white paper for you: Pairing DevOps and databases

    DevOps has been a blessing for developers and companies ever since it burst onto the scene in 2008, but its use isn’t only limited to application development. Check out this white paper to learn how MongoDB is designed to integrate with DevOps teams and processes, guaranteeing high availability and unprecedented database visibility.

    Download

  • How Pymetrics is methodically breaking the glass ceiling

    Pymetrics believes that only a deliberate approach, which systemically, consistently, and thoroughly removes bias, can lead to gender equality in employment. Learn how they achieve this with the use of gamified solutions, blind auditions and algorithms in this white paper.

    Download

  • 5 ways to protect next-gen application against ransomware

    Neither traditional nor native no relational database tools deliver the necessary backup and recovery capabilities required to protect against ransomware. Dive into this ebook to research a solution meant to work with non-relational databases and applications while filling in 5 key gaps left by traditional backup and scripted solutions.

    Download

  • How to get the most from your database monitoring system

    Your database monitoring programs don’t have to simply do one job and fade away to the background. When you choose the right program, you can deploy analytics that allows you to visualize the health, performance, and availability of your open source or NoSQL databases. Read on to learn how SolarWinds provides comprehensive database monitoring.

    Download

  • Computer Weekly – 25 August 2020: When algorithms don't play fair

    In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.

    Download

  • Why open source DB alternatives are exploding in popularity

    Why are traditional, commercial DBs declining in popularity? Watch this webinar to learn why some think the ROI on commercial databases and their support is declining and learn how to leverage emerging database support alternatives, like open source.

    Download

  • The cost of running MongoDB, TimescaleDB and CrateDB for industrial IoT

    Many database SaaS solutions have emerged in the big data era, and the industrial IoT is a prime example of where these databases can be most useful. Read on to see how different leading database vendors— MongoDB, TimescaleDB, and CrateDB—compare to each other when it comes to cost, efficiency, usability, security, and more.

    Download

  • How Bain & Company made a fact-based modernization roadmap

    Needing to quickly and confidently assess their applications’ health, Bain & Company turned to CAST Highlight. With CAST’s solutions, Bain was able to rapidly analyze the source code of an initial set of 26 core business applications—all candidates for modernization. From this analysis came a detailed roadmap to modernization.

    Download