Security Architectures Reports

Expert Strategies to Securing a Virtual Environment
sponsored by TechTarget Security
EGUIDE: This expert e-guide presents three of the most common security problems that IT professionals face in virtual environments and how your business can best overcome them.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

TechTarget Security

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER: What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

HP Mobile Application Security
sponsored by Hewlett Packard Enterprise
WEBCAST: Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

Hewlett Packard Enterprise

The path to securing your mobile Enterprise
sponsored by Juniper Networks, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.
Posted: 12 Jul 2012 | Published: 12 Jul 2012

Juniper Networks, Inc.

Telecom Carrier Offers First-of-its-Kind Cloud Security Solution
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study demonstrates how one telecom provider developed an intelligent visual data analysis engine that allowed them to identify voice and data threats in real time. This provided them with a holistic view of their network environment while bolstering overall data security by securing the voice network.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Making Mobility Matter in Healthcare Data Security
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

DellEMC and Intel®

Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER: Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Cisco Systems, Inc.

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER: You need to take several key security elements into account when planning your cloud initiative. This guide offers practical guidance for incorporating security into your cloud project and offers a checklist to help you choose the right cloud provider for your organization.
Posted: 15 May 2012 | Published: 15 May 2012

Intel

Protecting your Network and Data Center with Next-Gen Firewalls
sponsored by Palo Alto Networks
EGUIDE: Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER: Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011

AT&T Corp

Is Your Network Ready for Cloud Computing - Presentation Transcript
sponsored by Cisco Systems, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript will look at areas to cover with the cloud provider, including possible adjustments to firewalls and other perimeter defenses such as IPS, and how to ensure the changes don’t violate security policy.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

Cisco Systems, Inc.

Juniper Networks Mobile Security Solution
sponsored by Juniper Networks, Inc.
WHITE PAPER: This resource explores an innovative, market leading mobile security solution that mitigates the risks associated with deploying IP-based services.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

Juniper Networks, Inc.

X-Force Mid-Year Trend Report
sponsored by IBM
ANALYST REPORT: This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Posted: 11 Jan 2012 | Published: 11 Jan 2012

IBM

HP TippingPoint Intrusion Prevention System
sponsored by HPM Networks
WHITE PAPER: HP TippingPoint leads the entire Network Security Intelligence community in vulnerability research, providing the necessary information to stay ahead of the threat landscape. This document will provide summaries of the data provided by top sources.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

HPM Networks

IT in Europe Virtual Data Centre Vol. 1, No. 3 Server Hardware and Refresh Cycle Options
sponsored by TechTarget ComputerWeekly.com 
EZINE: Virtualization has come a long way, and now IT pros are tasked with keeping their virtual machines secure. This expert e-zine follows the evolution of virtualization and offers advice for developing an effective security strategy. Plus, find out what took place at VMworld 2011 within the virtualization and cloud arenas.
Posted: 27 Sep 2011 | Published: 27 Sep 2011

TechTarget ComputerWeekly.com 

Tackling Today’s Networking Challenges: How to Reduce the Risk and Protect Your Network from Security Vulnerabilities
sponsored by HPE and Intel®
PRESENTATION TRANSCRIPT: This webinar presents important ways IT pros can protect their networks from security vulnerabilities.
Posted: 13 Sep 2011 | Published: 09 Sep 2011

HPE and Intel®

Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper lays out five "best practice" ways to fortify your planned or existing virtualized environment, ensuring that it is architected for security, malware suppression, and regulation compliance.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

Turning Security Upside-Down
sponsored by OpenText Security Solutions
WHITE PAPER: This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defence strategy and learn how cloud-based solutions fit into the security technology market.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

OpenText Security Solutions

E-Guide: Best Practices for Securing Your Network
sponsored by DellEMC and Intel®
EGUIDE: This expert e-guide explains how to effectively secure your network with a practical defense-in-depth approach to security. You’ll also find the critical elements all organizations must review as they consider SaaS products.
Posted: 26 May 2011 | Published: 26 May 2011

DellEMC and Intel®

Make Virtual Desktop Security Simpler and More Scalable
sponsored by Citrix
IT BRIEFING: Virtualization calls for new security strategies that integrate user profile information, location, and other relevant data. But many companies are unsure how they can adapt their approach accordingly. Develop a deeper understanding of the malware landscape so you can empower end users and protect your organization against potential threats.
Posted: 16 May 2011 | Published: 16 May 2011

Citrix

Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011

Intel

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhancing Server Platform Security with VMware
sponsored by Intel
WHITE PAPER: Intel® Cloud Builders built a cloud with the use of a technology preview version of VMware vCenter Server, VMware vSphere Hypervisor, Intel Xeon processor 5600 series based server platforms and a plug in designed to interface with Intel Trusted Execution technology to provide platform attestration in the cloud.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Intel