Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014
|
|
|
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER:
Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014
|
|
|
Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST:
This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014
|
|
|
A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER:
In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014
|
|
|
What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET:
This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014
|
|
|
Managing IBM License Complexity
sponsored by Flexera Software
WHITE PAPER:
In this white paper, examine the most common IBM license models under three categories -- user-based, capacity-based, and "other" -- along with helpful examples. Plus, discover a discovery, inventory and license management tool that simplifies and automates IBM license management.
Posted: 23 Jun 2014 | Published: 31 Dec 2011
|
|
|
Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER:
This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014
|
|
|
Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER:
This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014
|
|
|
Examining Cloud Computing Threats and Mitigations
sponsored by CenturyLink Technology Solutions
EGUIDE:
This expert e-guide details the new threats that come with cloud computing and how you should deal with them.
Posted: 19 Jun 2014 | Published: 19 Jun 2014
|
|
|
Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER:
This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014
|
|
|
Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER:
This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014
|
|
|
The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER:
This white paper introduces 5 steps you can take to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER:
This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Omnichannel Considerations for the Purchase Order Process
sponsored by OpenText GXS
WHITE PAPER:
Find out how adopting an omnichannel experience can improve the purchase order process, and benefit both the customers and the business.
Posted: 16 Jun 2014 | Published: 30 Sep 2012
|
|
|
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER:
This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER:
This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014
|
|
|
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY:
In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014
|
|
|
5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER:
This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014
|
|
|
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013
|
|
|
A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER:
This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012
|
|
|
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER:
This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014
|
|
|
Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014
|
|
|
6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER:
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014
|
|
|
Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY:
Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014
|
|
|
Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
|
|