Security Infrastructure Reports

Unified Threat Management: From Business Problem to Technical Solution
sponsored by TechTarget Security
EBOOK: Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

TechTarget Security

The fastest most secure path to mobile employee productivity
sponsored by Citrix
WHITE PAPER: This crucial paper examines how your organization can effectively embrace BYOD and consumerization without having to sacrifice your IT environment's security.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Citrix

Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Citrix

BYOD: Balance mobile freedom with enterprise security
sponsored by IBM
WHITE PAPER: This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis

NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER: In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012

IBM

How much security does your SMB need?
sponsored by IBM
WHITE PAPER: This resource is an essential guide for SMBs looking to make the right investments in security to ensure optimum protection.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

IBM

Why Leaks Matter
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Lumeta Corporation

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Enterprise

Key Considerations For Mobile Device Security and Management
sponsored by Code42
EGUIDE: This expert guide from SearchConsumerization.com examines specific liabilities that you must consider when formulating your mobile security strategy, along with common challenges and potential loopholes in security solutions you may encounter.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Code42

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Meeting Backup and Archive Challenges - Today and Tomorrow
sponsored by Fujitsu
WHITE PAPER: This exclusive paper discusses the backup and recovery challenges that organizations today face, focusing on how you can overcome common data management and archiving challenges to ensure that, in the event of disaster, your critical data and services are up and running as fast as possible.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Fujitsu

TWO-FACTOR AUTHENTICATION OPTIONS, USE CASES AND BEST PRACTICES
sponsored by Celestix Networks
EGUIDE: This expert e-guide is a pivotal resource to understand how to best use two-factor authentication security options. Single-factor password-based authentication systems are doomed to fail, so read on with the experts to learn the best practices to protect your business.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Celestix Networks

Top 5 Mobility Security Concerns with Consumerization
sponsored by More Direct
EGUIDE: This expert guide from SearchConsumerization.com examines how your organization can overcome the security problems that consumerization can bring. Read on to learn how to ensure mobile data security and compliance while supplying enough network bandwidth for BYOD.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

More Direct

Identity & Access Management Summit 2014
sponsored by Gartner
BROCHURE: This brochure is for the Gartner Summit, occurring March 17th – 18th, 2014, where attendees can gain 2 days' worth of valuable content regarding identity and access management (IAM). Click now to learn about the global IT leaders who will discuss strategic trends that will keep businesses protected for years to come.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Gartner

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

IAM Evaluation And Deployment Guidelines
sponsored by OpenIAM
EGUIDE: Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco