Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER:
Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014
|
|
|
Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER:
Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014
|
|
|
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER:
This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013
|
|
|
10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER:
This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014
|
|
|
Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER:
Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014
|
|
|
Case Study - Anittel Simplifies Managed AV Service
sponsored by OpenText Security Solutions
WHITE PAPER:
This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013
|
|
|
A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER:
Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014
|
|
|
Phishing and Web Security
sponsored by OpenText Security Solutions
WHITE PAPER:
This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013
|
|
|
Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014
|
|
|
Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014
|
|
|
Drive More Value from Endpoint Security with Cloud-Based Anti-Virus Protection
sponsored by OpenText Security Solutions
WHITE PAPER:
This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014
|
|
|
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER:
This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER:
This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013
|
|
|
2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER:
This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Web Security: Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Taking Managed Security Services To The Next Level
sponsored by OpenText Security Solutions
WHITE PAPER:
This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013
|
|
|
Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER:
This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
|
|
|
Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014
|
|
|
Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER:
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012
|
|
|
Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by OpenText Security Solutions
WHITE PAPER:
This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013
|
|
|
Stalking the Kill Chain
sponsored by EMC Corporation
WHITE PAPER:
Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb.
Posted: 15 Apr 2014 | Published: 31 Oct 2012
|
|
|
The Critical Incident Response Maturity Journey
sponsored by EMC Corporation
WHITE PAPER:
This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 14 Apr 2014 | Published: 31 Dec 2013
|
|
|
10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER:
This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014
|
|
|
Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER:
This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010
|
|