How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER:
Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014
|
|
|
Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco
WHITE PAPER:
In this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
Posted: 01 Apr 2014 | Published: 28 Feb 2014
|
|
|
Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER:
Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013
|
|
|
Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER:
View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
|
|
|
Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER:
This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
|
|
|
Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER:
This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012
|
|
|
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER:
This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013
|
|
|
International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER:
This resource contains the results of an international survey on enterprise mobility, consumerization, and mobile security, and also includes considerations for IT departments in light of this new information.
Posted: 21 Mar 2014 | Published: 31 Jul 2013
|
|
|
Modern network security for modern threats
sponsored by Palo Alto Networks
WHITE PAPER:
This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014
|
|
|
Selecting a Safe and Smart Surveillance Drive
sponsored by Seagate Technology
WHITE PAPER:
Check out this white paper to find a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use. Read on and find out which storage controller may be the one that meets your organization's needs.
Posted: 14 Mar 2014 | Published: 28 Feb 2014
|
|
|
Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014
|
|
|
Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER:
This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014
|
|
|
Achieve Deeper Network Security and Application Control
sponsored by DellEMC and Intel®
EBOOK:
Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014
|
|
|
Secure Mobile Devices with a Next Generation Firewall
sponsored by Dell Software
WHITE PAPER:
This white paper provides one suggestion for securing your mobile devices with a next generation firewall.
Posted: 11 Mar 2014 | Published: 11 Mar 2014
|
|
|
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER:
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
|
|
|
Technical Guide on Application Security
sponsored by TechTarget Security
EZINE:
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
|
|
|
EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER:
Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011
|
|
|
Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER:
This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014
|
|
|
Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER:
This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013
|
|
|
A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER:
This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013
|
|
|
Securing Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER:
This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
|
|
|
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER:
This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
|
|
|
Understanding and Selecting Data Masking Solutions
sponsored by IBM
WHITE PAPER:
This white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
Posted: 28 Feb 2014 | Published: 10 Aug 2012
|
|
|
Unified Communications Security
sponsored by NextPlane
WHITE PAPER:
This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER:
This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|