4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER:
This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014
|
|
|
Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER:
This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014
|
|
|
Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER:
This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011
|
|
|
How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER:
This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014
|
|
|
Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER:
This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013
|
|
|
Security Testing For Financial Institutions
sponsored by Ixia
WHITE PAPER:
Security breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis.
Posted: 05 May 2014 | Published: 31 Jan 2014
|
|
|
A Six-Step Plan for Competitive Device Evaluations
sponsored by Ixia
WHITE PAPER:
Discover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
Posted: 05 May 2014 | Published: 31 Dec 2013
|
|
|
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
sponsored by Citrix
WHITE PAPER:
This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013
|
|
|
The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER:
This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
Posted: 02 May 2014 | Published: 02 May 2014
|
|
|
Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER:
Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014
|
|
|
Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER:
Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014
|
|
|
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER:
This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013
|
|
|
10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER:
This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014
|
|
|
Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER:
Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014
|
|
|
Case Study - Anittel Simplifies Managed AV Service
sponsored by OpenText Security Solutions
WHITE PAPER:
This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013
|
|
|
Phishing and Web Security
sponsored by OpenText Security Solutions
WHITE PAPER:
This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013
|
|
|
Providence Health & Services is Reacting to Threats Five Times Faster
sponsored by Symantec Corporation
WHITE PAPER:
This case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
Posted: 25 Apr 2014 | Published: 31 Dec 2010
|
|
|
Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER:
Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013
|
|
|
Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER:
This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011
|
|
|
Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014
|
|
|
Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014
|
|
|
Cisco Email Security
sponsored by Cisco
WHITE PAPER:
This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014
|
|
|
Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014
|
|
|
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER:
This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
|
|
|
Sharing Sensitive Corporate Documents without Compromising Security and Governance
sponsored by IntraLinks, Inc
WHITE PAPER:
This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
Posted: 21 Apr 2014 | Published: 21 Apr 2013
|
|