3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013
|
|
|
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014
|
|
|
Information Security Magazine – July/August 2014
sponsored by TechTarget Security
EZINE:
Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014
|
|
|
What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER:
This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014
|
|
|
Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER:
This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012
|
|
|
Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER:
This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013
|
|
|
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER:
This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014
|
|
|
SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD:
DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014
|
|
|
Bring Your Own Cloud: Cloud Services Get Personal in the Workplace
sponsored by TechTarget Cloud Computing
EBOOK:
In this guide, consultant Tom Nolle and journalist George Lawton discuss the "bring your own cloud" trend, offering sound advice for organizations looking to keep ahead of the cloud curve.
Posted: 10 Jul 2014 | Published: 10 Jul 2014
|
|
|
Exclusive Healthcare E-Zine Reveals New Technologies
sponsored by TechTarget Health IT
EZINE:
ACOs are making significant telemedicine investments for the savings virtual visits to patients can bring. This issue of Pulse delves into telemedicine, health analytics and more.
Posted: 10 Jul 2014 | Published: 10 Jul 2014
|
|
|
Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER:
This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013
|
|
|
IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER:
This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013
|
|
|
Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER:
In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012
|
|
|
Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER:
This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013
|
|
|
BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
sponsored by Sophos
WHITE PAPER:
This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
Posted: 03 Jul 2014 | Published: 25 Feb 2014
|
|
|
Mobile Device Management Buyers Guide
sponsored by Sophos
WHITE PAPER:
This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 03 Jul 2014 | Published: 25 Feb 2014
|
|
|
Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
sponsored by Sophos
WHITE PAPER:
This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
Posted: 03 Jul 2014 | Published: 01 Jul 2014
|
|
|
Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER:
In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013
|
|
|
Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER:
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013
|
|
|
Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014
|
|
|
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER:
Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014
|
|
|
Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014
|
|
|
Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST:
This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014
|
|
|
Information Security ANZ July 2014
sponsored by TechTarget Security
EZINE:
This ezine looks at how will new privacy laws impact IT departments in Australia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
|
|
|
Information Security ASEAN July 2014
sponsored by TechTarget Security
EZINE:
This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014
|
|