Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER:
Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014
|
|
|
A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER:
In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014
|
|
|
Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014
|
|
|
Choose the Service Desk Delivery Model that Makes Sense
sponsored by Pangea Systems
WHITE PAPER:
This white paper discusses three delivery models, including the benefits and considerations you must take when choosing the right model for your business.
Posted: 20 Jun 2014 | Published: 31 Dec 2012
|
|
|
HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014
|
|
|
Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER:
This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014
|
|
|
Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER:
This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014
|
|
|
Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER:
This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014
|
|
|
Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER:
This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER:
Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014
|
|
|
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY:
In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014
|
|
|
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013
|
|
|
A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER:
This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012
|
|
|
6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER:
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014
|
|
|
Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER:
With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013
|
|
|
Cloud Adoption & Risk Report
sponsored by SkyHigh
WHITE PAPER:
This survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
Posted: 03 Jun 2014 | Published: 03 Jun 2014
|
|
|
Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014
|
|
|
Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER:
This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014
|
|
|
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY:
This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012
|
|
|
15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER:
This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014
|
|
|
Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE:
This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014
|
|
|
Consultants: How Can You Secure Your Information with Customers?
sponsored by Globalscape
WHITE PAPER:
This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014
|
|
|
Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY:
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013
|
|
|
How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER:
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014
|
|
|
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER:
In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014
|
|