Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER:
Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
|
|
|
CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER:
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013
|
|
|
Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER:
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013
|
|
|
Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER:
This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009
|
|
|
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER:
Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013
|
|
|
Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER:
Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013
|
|
|
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER:
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012
|
|
|
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
|
|
|
Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER:
In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012
|
|
|
BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013
|
|
|
A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER:
This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012
|
|
|
Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER:
Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013
|
|
|
McAfee Tackles the Complexities of Endpoint Security
sponsored by Intel Security
WHITE PAPER:
This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013
|
|
|
Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER:
This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER:
This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
The Evolving Landscape of Desktop Security
sponsored by Intel Security
WHITE PAPER:
This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013
|
|
|
When Malware Goes Mobile: Causes, Outcomes and Cures
sponsored by Sophos
WHITE PAPER:
This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
Posted: 23 May 2013 | Published: 17 May 2013
|
|
|
Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER:
In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013
|
|
|
Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER:
This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER:
For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013
|
|
|
2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER:
This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013
|
|
|
Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER:
This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012
|
|
|
Strategies for boosting your practice’s information immunity
sponsored by GFI LanGuard
WHITE PAPER:
According to a 2011 patient privacy and data security study, 96 percent of health-care providers had at least one data breach during the previous two years. Consult this informative white paper to learn more about external threats and internal challenges of the evolving enterprise.
Posted: 31 Aug 2012 | Published: 31 Aug 2012
|
|
|
Think Your Anti-Virus Software Is Working? Think Again
sponsored by Lumension
WHITE PAPER:
Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Posted: 13 Jul 2012 | Published: 31 Mar 2011
|
|
|
2012 Bit9 Cyber Security Research Report
sponsored by Bit9, Inc.
WHITE PAPER:
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers.
Posted: 23 May 2012 | Published: 23 May 2012
|
|