Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER:
This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014
|
|
|
Securing Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER:
This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
|
|
|
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER:
This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
|
|
|
NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER:
This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013
|
|
|
Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER:
This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012
|
|
|
PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Unified Communications Security
sponsored by NextPlane
WHITE PAPER:
This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
The 10 “Must-Haves” for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER:
This informative paper examines the common security issues surrounding BYOD and provides ten helpful "must-haves" for ensuring that your mobile initiatives are safe and secure.
Posted: 27 Feb 2014 | Published: 01 Jun 2014
|
|
|
Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER:
Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012
|
|
|
Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER:
This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER:
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Securing your Midsized Business
sponsored by IBM
WHITE PAPER:
This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013
|
|
|
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER:
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This guide takes a look at the the wide-scale shift to an increased mobile world and some best practices for tackling challenges and optimizing wokplace efficiency.
Posted: 26 Feb 2014 | Published: 31 Aug 2013
|
|
|
Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
|
|
|
The fastest most secure path to mobile employee productivity
sponsored by Citrix
WHITE PAPER:
This crucial paper examines how your organization can effectively embrace BYOD and consumerization without having to sacrifice your IT environment's security.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Securing Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER:
This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
BYOD: Balance mobile freedom with enterprise security
sponsored by IBM
WHITE PAPER:
This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER:
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 21 Feb 2014 | Published: 31 Dec 2012
|
|
|
Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER:
This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|