Intergrated Mobile Security for Small and Midsize Businesses
sponsored by TechTarget Security
WHITE PAPER:
This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies.
Posted: 17 May 2013 | Published: 17 May 2013
|
|
|
Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
sponsored by IBM
WHITE PAPER:
IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
Posted: 24 Jul 2013 | Published: 24 Jul 2013
|
|
|
How to Make Your Business More Flexible & Cost Effective?
sponsored by Panda Security
WHITE PAPER:
Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
Posted: 17 Jul 2013 | Published: 17 Jul 2013
|
|
|
Panda Cloud Systems Management: Monitor Datasheet
sponsored by Panda Security
WHITE PAPER:
This informative paper discusses a cloud-based IT management solution that anticipates problems proactively, monitoring device activity through mediums such as alerts, dashboards and tickets so you can deal with incidents before they cause problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013
|
|
|
Dell DVS Enterprise - Mobile Secure Desktop
sponsored by Dell and VMware
WHITE PAPER:
This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
|
|
|
Cloud security, options and trends
sponsored by CenterBeam
WHITE PAPER:
In this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.
Posted: 28 May 2013 | Published: 28 May 2013
|
|
|
Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER:
Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012
|
|
|
SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER:
Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012
|
|
|
Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER:
This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER:
This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER:
Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013
|
|
|
Agentless Security for Vmware Virtual Data Centers and Cloud
sponsored by Trend Micro
WHITE PAPER:
This resource will help you understand how applying traditional architectures to virtual environments can hurt your organization's productivity and security posture, and what you need to do in order to secure your virtual environment effectively. Read on to learn more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012
|
|
|
Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER:
What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012
|
|
|
Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER:
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011
|
|
|
Making Mobility Matter in Healthcare Data Security
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place.
Posted: 18 Jun 2012 | Published: 18 Jun 2012
|
|
|
Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012
|
|
|
Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER:
This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012
|
|
|
Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER:
You need to take several key security elements into account when planning your cloud initiative. This guide offers practical guidance for incorporating security into your cloud project and offers a checklist to help you choose the right cloud provider for your organization.
Posted: 15 May 2012 | Published: 15 May 2012
|
|
|
The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER:
Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011
|
|
|
Juniper Networks Mobile Security Solution
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This resource explores an innovative, market leading mobile security solution that mitigates the risks associated with deploying IP-based services.
Posted: 18 Jan 2012 | Published: 18 Jan 2012
|
|
|
HP TippingPoint Intrusion Prevention System
sponsored by HPM Networks
WHITE PAPER:
HP TippingPoint leads the entire Network Security Intelligence community in vulnerability research, providing the necessary information to stay ahead of the threat landscape. This document will provide summaries of the data provided by top sources.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
|
|
|
Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This paper lays out five "best practice" ways to fortify your planned or existing virtualized environment, ensuring that it is architected for security, malware suppression, and regulation compliance.
Posted: 02 Sep 2011 | Published: 02 Sep 2011
|
|
|
Turning Security Upside-Down
sponsored by OpenText Security Solutions
WHITE PAPER:
This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defence strategy and learn how cloud-based solutions fit into the security technology market.
Posted: 29 Jul 2011 | Published: 29 Jul 2011
|
|
|
Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER:
As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011
|
|
|
Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhancing Server Platform Security with VMware
sponsored by Intel
WHITE PAPER:
Intel® Cloud Builders built a cloud with the use of a technology preview version of VMware vCenter Server, VMware vSphere Hypervisor, Intel Xeon processor 5600 series based server platforms and a plug in designed to interface with Intel Trusted Execution technology to provide platform attestration in the cloud.
Posted: 11 Apr 2011 | Published: 11 Apr 2011
|
|