Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER:
This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013
|
|
|
A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by TechTarget Security
WHITE PAPER:
This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013
|
|
|
How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY:
Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013
|
|
|
Third Annual Juniper Networks Mobile Threats Report
sponsored by IBM and Juniper
WHITE PAPER:
This exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.
Posted: 31 Jul 2013 | Published: 31 Jul 2013
|
|
|
Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER:
Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013
|
|
|
Hackers Open Malware Backdoor in Apache Webservers
sponsored by TechTarget Security
EGUIDE:
A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.
Posted: 17 Jul 2013 | Published: 17 Jul 2013
|
|
|
Rethink Defense-In-Depth Security Model For BYOD
sponsored by TechTarget Security
EGUIDE:
This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013
|
|
|
A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE:
Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013
|
|
|
Malware Attacks Demand a New Malware Defense Approach
sponsored by TechTarget Security
EGUIDE:
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013
|
|
|
The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE:
This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013
|
|
|
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:
In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
|
|
|
Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by TechTarget Security
WHITE PAPER:
This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER:
Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013
|
|
|
When Malware Goes Mobile: Causes, Outcomes and Cures
sponsored by Sophos
WHITE PAPER:
This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
Posted: 23 May 2013 | Published: 17 May 2013
|
|
|
Targeted attacks: Preparation and Mitigation
sponsored by TechTarget Security
EGUIDE:
This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
Posted: 17 May 2013 | Published: 17 May 2013
|
|
|
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by OpenText Security Solutions
CASE STUDY:
In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012
|
|
|
Anittel Simplifies Managed Antivirus Service Case Study
sponsored by OpenText Security Solutions
CASE STUDY:
This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013
|
|
|
Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER:
In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013
|
|
|
Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO:
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013
|
|
|
Threat Prevention Techniques: Best Practices for Threat Management
sponsored by GeoTrust, Inc.
EGUIDE:
SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
Posted: 02 May 2013 | Published: 02 May 2013
|
|
|
SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER:
Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012
|
|
|
Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER:
This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER:
For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013
|
|
|
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER:
Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013
|
|