Security Management Reports

It's Time to Simplify Large File Exchanges
sponsored by Globalscape
WHITE PAPER: Access this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
Posted: 23 May 2014 | Published: 23 May 2014

Globalscape

Consultants: How Can You Secure Your Information with Customers?
sponsored by Globalscape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

Globalscape

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

Globalscape

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Cybersecurity Is Every CIO's Problem
sponsored by TechTarget CIO
EBOOK: As breaches mount, many CIOs are finding that enterprise cybersecurity is a competitive advantage and are showing the business how security investments bolster the bottom line.
Posted: 21 May 2014 | Published: 21 May 2014

TechTarget CIO

Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST: This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014

Clearswift

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Understanding Microsoft Office 2013 Features, Licensing and Security
sponsored by TechTarget Enterprise Desktop
EBOOK: Before moving to Microsoft Office 2013 or Office 365, IT pros should compare features, licensing schemes and application usage and be aware of emerging Office alternatives.
Posted: 19 May 2014 | Published: 22 May 2014

TechTarget Enterprise Desktop

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

The Surprising Affordability of Today’s Cloud Archive
sponsored by Infrascale
WHITE PAPER: This resource explains why cloud data archive is a more secure and reliable backup option over legacy tape solutions for MSPs.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by TechTarget Security
EBOOK: Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
Posted: 14 May 2014 | Published: 15 May 2014

TechTarget Security

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

The Power To Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: View this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Combatting Advanced Threats with Endpoint Security Intelligence
sponsored by IBM
WHITE PAPER: Advanced security threats are exploding worldwide and the sophistication of these attacks is higher than ever. How can organizations stay ahead of these advanced threats? This white paper discusses how to combat advanced security threats by adopting an integrated, intelligent and automated approach to endpoint security.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM