Vulnerability Assessment
sponsored by Symantec Corporation
WHITE PAPER:
Access this whitepaper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to find an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
Posted: 14 Oct 2013 | Published: 14 Oct 2013
|
|
|
Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER:
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013
|
|
|
Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER:
This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011
|
|
|
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER:
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013
|
|
|
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER:
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013
|
|
|
The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER:
This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013
|
|
|
Cutting Complexity – Simplifying Security
sponsored by Kaspersky
WHITE PAPER:
Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013
|
|
|
IT Security. Fighting the Silent Threat
sponsored by Kaspersky
WHITE PAPER:
Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013
|
|
|
CORE Security and the Payment Card Industry Data Security Standard
sponsored by Core Security Technologies
WHITE PAPER:
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.
Posted: 09 Oct 2013 | Published: 09 Oct 2013
|
|
|
The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
sponsored by Azzurri
WHITE PAPER:
This resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
Posted: 09 Oct 2013 | Published: 09 Oct 2013
|
|
|
Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER:
In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013
|
|
|
Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER:
Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013
|
|
|
Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012
|
|
|
Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012
|
|
|
The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013
|
|
|
Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013
|
|
|
Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER:
Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013
|
|
|
Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER:
This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|
|
|
Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER:
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012
|
|
|
Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER:
This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013
|
|
|
Top Three Mobile Application Threats
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012
|
|
|
Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013
|
|
|
4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013
|
|
|
Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER:
This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013
|
|
|
Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER:
This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013
|
|