Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014
|
|
|
Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
EGUIDE:
This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014
|
|
|
Drive More Value from Endpoint Security with Cloud-Based Anti-Virus Protection
sponsored by OpenText Security Solutions
WHITE PAPER:
This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014
|
|
|
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER:
This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Keep Endpoint Data Safe
sponsored by Code42
WEBCAST:
This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014
|
|
|
Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER:
This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013
|
|
|
Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER:
This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER:
This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by OpenText Security Solutions
WHITE PAPER:
This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014
|
|
|
Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by OpenText Security Solutions
CASE STUDY:
This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: 18 Apr 2014 | Published: 28 Feb 2014
|
|
|
Taking Managed Security Services To The Next Level
sponsored by OpenText Security Solutions
WHITE PAPER:
This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013
|
|
|
Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014
|
|
|
NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER:
This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013
|
|
|
Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER:
This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010
|
|
|
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER:
This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010
|
|
|
A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER:
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012
|
|
|
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER:
This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010
|
|
|
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
sponsored by Gartner
BROCHURE:
Access the following event brochure to see exactly what will be covered at this year's Gartner Catalyst Conference. Gain a firsthand look at the featured speakers, prices, scheduling, and of course, where you can register.
Posted: 10 Apr 2014 | Published: 10 Apr 2014
|
|
|
The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER:
This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014
|
|
|
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER:
Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013
|
|
|
A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER:
This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014
|
|
|
Test Data Management for Security and Compliance
sponsored by EMC Corporation
WHITE PAPER:
As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
|
|
|
Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER:
This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
|
|
|
Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER:
This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
|
|
|
Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE:
This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014
|
|