All Research Sponsored By:TechTarget Security

WLAN Access Control and Wi-Fi Network Needs
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013


Taking Action to Secure Web Applications
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013


Threat Detection (Antivirus Intrusion Prevention)
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013


Solving the Challenges of BYOD
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013


May Information Security Magazine
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013


Unlocking the Opportunity of SIEM Technology
EGUIDE: Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
Posted: 25 Apr 2013 | Published: 25 Apr 2013


The Improvement and Evolution of SIEM
EGUIDE: Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
Posted: 25 Apr 2013 | Published: 25 Apr 2013


PCI compliance in the cloud: Can cloud service providers manage PCI?
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013


PCI Council issues mobile application rules for software developers
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013


The Future of Next-Generation SIEM
EGUIDE: This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013


How a next-generation firewall prevents application-layer attacks
EGUIDE: The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
Posted: 24 Apr 2013 | Published: 24 Apr 2013


Security Information Management Systems and Application Monitoring
EGUIDE: Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013


Improving Enterprise Email Security: Systems and Tips
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013


Six Email Security Best Practices for Email SaaS
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Discover the Risks and Rewards Behind a Mobile Workforce
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Collaboration Services: Decision Criteria and 10 Questions to Ask Your Potential Collaboration Vendors
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com details the ten questions you should ask any potential collaboration vendor and offers a five-step process that will help you pick out the best products to create your collaboration architecture.
Posted: 19 Apr 2013 | Published: 19 Apr 2013


The Top 4 Business Considerations for Your UC Solution
EGUIDE: Get help determining your organization's unified communications needs in order to make a more informed solution purchasing decision.
Posted: 19 Apr 2013 | Published: 19 Apr 2013


Enterprise Social Tools Need UC Integration to Thrive
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores why enterprise social networking tools need to be integrated with your everyday unified communications (UC) tools to be successful and unveils the benefits such an effort can provide.
Posted: 19 Apr 2013 | Published: 19 Apr 2013


UC and the Evolution of Enterprise Telephony
EGUIDE: This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).
Posted: 18 Apr 2013 | Published: 18 Apr 2013


The Evolution of Collaboration: Tying the Knot with UC
EGUIDE: In this E-Guide from SearchUnifiedCommunications.com, we explore the evolving relationship between unified communications (UC) and collaboration and explain why UCC is a match that can benefit any organization.
Posted: 17 Apr 2013 | Published: 17 Apr 2013


How to Thwart Privilege Creep with Access Reviews
EGUIDE: In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013


Email Security Technical Guide
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013


Information Security Magazine - April 2013
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013


Network Security Technologies Technical Guide
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012


Mobile Application Management in the BYOD Era
EGUIDE: This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013