Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER:
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Securing your Midsized Business
sponsored by IBM
WHITE PAPER:
This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013
|
|
|
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER:
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This guide takes a look at the the wide-scale shift to an increased mobile world and some best practices for tackling challenges and optimizing wokplace efficiency.
Posted: 26 Feb 2014 | Published: 31 Aug 2013
|
|
|
Mobile Device Management Buyers Guide
sponsored by Sophos
WHITE PAPER:
This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
|
|
|
Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
|
|
|
The fastest most secure path to mobile employee productivity
sponsored by Citrix
WHITE PAPER:
This crucial paper examines how your organization can effectively embrace BYOD and consumerization without having to sacrifice your IT environment's security.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Securing Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER:
This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Compliance in the Cloud: Myth or Reality
sponsored by SunGard Availability Services
WHITE PAPER:
This expert resource covers a series of frequently asked questions about cloud providers and how they handle data protection and compliance.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
BYOD: Balance mobile freedom with enterprise security
sponsored by IBM
WHITE PAPER:
This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value.
Posted: 24 Feb 2014 | Published: 24 Feb 2014
|
|
|
Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER:
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 21 Feb 2014 | Published: 31 Dec 2012
|
|
|
Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER:
In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014
|
|
|
Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER:
In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014
|
|
|
Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER:
This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER:
This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER:
This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013
|
|
|
Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER:
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
|
|
|
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER:
This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
|
|
|
Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER:
This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
|
|
|
Protection for Every Enterprise: How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER:
Access this informative resource to learn about a comprehensive mobility management platform that promises to meet the constantly changing demands of enterprise security.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
|
|