All Research Sponsored By:TechTarget Security

A Comprehensive Guide to the Latest Threat Detection Technologies
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013


Information Security Magazine – July/August 2013
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013


Stopping Privilege Creep: Limiting User Privileges with Access Reviews
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013


Extended Enterprise Poses Identity and Access Management Challenges
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013


Handbook: Identity and Access Management
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013


Advanced mobile device management software capabilities to consider
EGUIDE: In this expert guide, learn what capabilities you should look for in a software solution that can help ensure successful deployment and management of mobile devices within your enterprise.
Posted: 23 Jul 2013 | Published: 23 Jul 2013


BYOD: The Evolution of Mobile Security
EGUIDE: This expert guide takes an in-depth look at the new technologies and innovations that are driving the shift towards enterprise mobility, along with how to adapt your management strategy to best take utilize them.
Posted: 22 Jul 2013 | Published: 22 Jul 2013


Securing and Mitigating Risk in the Cloud
EGUIDE: Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition.
Posted: 18 Jul 2013 | Published: 18 Jul 2013


Information Security Essential Guide: The Evolution of Threat Detection and Management
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013


Web Browser Security Features Make Attacks Harder
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013


Hackers Open Malware Backdoor in Apache Webservers
EGUIDE: A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.
Posted: 17 Jul 2013 | Published: 17 Jul 2013


Best Practices for Improving Mobile Data Security
EGUIDE: This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013


Best Practices for Managing and Understanding Mobile Authentication
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013


How to tackle cloud, IAM, and digital certificate problems in your organization
EBOOK: In this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
Posted: 11 Jul 2013 | Published: 11 Jul 2013


Mobile Application Security Best Practices to Protect Corporate Data
EGUIDE: This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks.
Posted: 11 Jul 2013 | Published: 11 Jul 2013


Information Security Threats: Building Risk Resilience
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013


Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013


Top 10 BYOD Pitfalls to Avoid
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013


Rethink Defense-In-Depth Security Model For BYOD
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013


Mobile Configuration Management Functions for Successful MDM
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013


MPLS vs. Ethernet: Which WAN Connectivity is Best?
EGUIDE: Which is better for wide area network connectivity: MPLS or Carrier Ethernet? Read on to find out.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

TOPICS:  WAN

The Future of Desktop Virtualization, Chapter 4
EBOOK: This expert resource discusses how bring your own device (BYOD) policies, when used in conjunction with virtual desktop infrastructure (VDI), can return control back to IT while reducing the administrative and management headaches commonly associated with user-owned devices in the enterprise.
Posted: 28 Jun 2013 | Published: 28 Jun 2013


MPLS Advantages and Disadvantages for WAN Connectivity
EGUIDE: Read this expert guide to learn the advantages and disadvantages of MPLS for WAN connectivity.
Posted: 27 Jun 2013 | Published: 27 Jun 2013


Corporate Data in the Consumer Cloud, Chapter 1--ATB on Cloud Apps and Services
EGUIDE: This e-guide offers advice for organizations wanting to limit their risk of exposure of sensitive data in the consumer-drive cloud era.
Posted: 27 Jun 2013 | Published: 27 Jun 2013


A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013