Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER:
This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014
|
|
|
Networking Monitoring Best Practices: Setting A Network Performance Baseline
sponsored by Ixia
EGUIDE:
Explore the necessities for a network performance baseline, potential challenges and how to overcome them with the tips and advice in this e-guide.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
|
|
|
Transcript: Network Visibility: Thinking Outside the Box
sponsored by Ixia
PRESENTATION TRANSCRIPT:
Explore how virtualization can challenge network monitoring, and discover a scalable solution that will help improve visibility for effective, scalable, secure network monitoring.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
|
|
|
Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER:
Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
|
|
|
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER:
This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
|
|
|
Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER:
Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013
|
|
|
Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER:
Gain an understanding of how monitoring switch automation fits your organization, and discover how different security tools can help boost your compliance initiatives.
Posted: 28 Feb 2014 | Published: 30 Nov 2013
|
|
|
PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER:
In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER:
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Unified Threat Management: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK:
To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Unified Threat Management: Decision Time
sponsored by TechTarget Security
EBOOK:
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014
|
|
|
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER:
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
|
|
|
Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This guide takes a look at the the wide-scale shift to an increased mobile world and some best practices for tackling challenges and optimizing wokplace efficiency.
Posted: 26 Feb 2014 | Published: 31 Aug 2013
|
|
|
Unified Threat Management: From Business Problem to Technical Solution
sponsored by TechTarget Security
EBOOK:
Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014
|
|
|
Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER:
This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014
|
|
|
Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER:
This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER:
This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER:
This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013
|
|
|
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:
This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
|
|
|
Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER:
This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
|
|
|
Seagate NAS - What's Driving Data Security and Remote Access Inside
sponsored by Seagate Technology
WHITE PAPER:
Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network.
Posted: 18 Feb 2014 | Published: 18 Feb 2014
|
|