Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER:
This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014
|
|
|
The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER:
This white paper introduces 5 steps you can take to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER:
This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER:
This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014
|
|
|
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY:
In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014
|
|
|
5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER:
This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014
|
|
|
Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER:
This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014
|
|
|
A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER:
This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012
|
|
|
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER:
This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014
|
|
|
Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014
|
|
|
6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER:
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014
|
|
|
Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
|
|
|
Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER:
With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013
|
|
|
The Insider Threat of Bring Your Own Cloud (BYOC)
sponsored by SkyHigh
WHITE PAPER:
This Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
Posted: 04 Jun 2014 | Published: 31 Jan 2014
|
|
|
Cloud Adoption & Risk Report
sponsored by SkyHigh
WHITE PAPER:
This survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
Posted: 03 Jun 2014 | Published: 03 Jun 2014
|
|
|
Managing Cloud Adoption and Risk
sponsored by SkyHigh
WHITE PAPER:
This 12-item checklist is to help IT pros securely fulfill a cloud adoption.
Posted: 02 Jun 2014 | Published: 02 Jun 2014
|
|
|
Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY:
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013
|
|
|
Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER:
This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014
|
|
|
TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY:
This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013
|
|
|
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY:
This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012
|
|
|
15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER:
This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014
|
|
|
The File Transfer Security Evolution
sponsored by Globalscape
WHITE PAPER:
This white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
Posted: 27 May 2014 | Published: 31 Dec 2013
|
|
|
Case Study: Globalscape® WAFS Expands the Panama Canal
sponsored by Globalscape
CASE STUDY:
This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
Posted: 27 May 2014 | Published: 31 Dec 2013
|
|
|
Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE:
This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014
|
|
|
It's Time to Simplify Large File Exchanges
sponsored by Globalscape
WHITE PAPER:
Access this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
Posted: 23 May 2014 | Published: 23 May 2014
|
|