Intergrated Mobile Security for Small and Midsize Businesses
sponsored by TechTarget Security
WHITE PAPER:
This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies.
Posted: 17 May 2013 | Published: 17 May 2013
|
|
|
How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by TechTarget Security
WHITE PAPER:
Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013
|
|
|
Rethinking MDM in a BYOD World
sponsored by TechTarget Security
WHITE PAPER:
Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected.
Posted: 01 Nov 2012 | Published: 01 Nov 2012
|
|
|
Web-facing applications: Security assessment tools and strategies
sponsored by TechTarget Security
WHITE PAPER:
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012
|
|
|
Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by TechTarget Security
WHITE PAPER:
This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by OpenText Security Solutions
WHITE PAPER:
This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013
|
|
|
How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER:
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 30 May 2013 | Published: 31 Dec 2012
|
|
|
Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award
sponsored by Sourcefire
WHITE PAPER:
In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.
Posted: 22 May 2013 | Published: 22 May 2013
|
|
|
Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER:
Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012
|
|
|
Five Security Considerations for the Mobile Age
sponsored by IBM
WHITE PAPER:
While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012
|
|
|
How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER:
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012
|
|
|
SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER:
Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012
|
|
|
Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER:
This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
Oracle Database Security: Cost Effective Security and Compliance
sponsored by Oracle Corporation UK Ltd
WHITE PAPER:
Read this exclusive resource that will help you develop a defense-in-depth, inside-out security strategy to better protect your organization from sophisticated, complex data threats.
Posted: 29 Apr 2013 | Published: 25 Mar 2011
|
|
|
Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER:
For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013
|
|
|
Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER:
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012
|
|
|
Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER:
This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013
|
|
|
Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER:
As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012
|
|
|
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER:
Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013
|
|
|
Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012
|
|
|
Evaluating Wireless Intrusion Prevention
sponsored by AirTight Networks, Inc.
WHITE PAPER:
This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.
Posted: 16 Apr 2013 | Published: 15 Apr 2013
|
|
|
10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER:
The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012
|
|
|
Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER:
Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012
|
|
|
Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER:
What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012
|
|
|
Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER:
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011
|
|