Security Systems Reports

Tips on Managing the Deluge of Information Security Threat Reports
sponsored by TechTarget Security
EGUIDE: Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

TechTarget Security

Cloud Security as a Service For Secure Cloud-Based Server Hosting
sponsored by TechTarget Security
EGUIDE: Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
Posted: 27 Nov 2013 | Published: 20 Apr 2011

TechTarget Security

Endpoint Security IT Decision Center Handbook 2
sponsored by TechTarget Security
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

TechTarget Security

High Performance, High Capacity 2048/4096-bit SSL Offload February 2013
sponsored by A10 Networks
WHITE PAPER: IT professionals are going to great lengths to foster business growth via data encryption. This guide outlines the importance of data protection and encryption, while exploring specific operating systems that provides scalability alongside enhanced performance levels.
Posted: 23 Dec 2013 | Published: 28 Feb 2013

A10 Networks

Overview: Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Security management is a top priority of every IT department, but unfortunately these processes are growing more and more complex each day. This guide explores the importance of comprehensive security strategies and how it can smooth businesses processes while ensuring a secure system.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

IBM

How to Create a Quality Cloud Security Solution
sponsored by XO Communications
WHITE PAPER: In this exclusive resource, find out how you can build a safe and effective cloud security strategy to ensure that your sensitive data stays in the right hands while utilizing the cloud.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

XO Communications

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Scaling Next-Generation Firewalls with Citrix NetScaler
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: IT professionals are always looking for new ways to deliver their applications quickly and effectively.This guide outlines next-generation firewalls that can help your network when you need more throughput.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

Citrix and Palo Alto Networks

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos

Three Guiding Principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
Posted: 19 Dec 2013 | Published: 31 Oct 2012

IBM

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER: In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Trend Micro

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro

Ponemon Study: The State of Advanced Persistent Threats
sponsored by Trusteer
WHITE PAPER: In this Ponemon Institute study, you'll learn how APTs are changing the threat landscape and making current security controls ineffective, and the best practices for making sure your security solution makes the cut.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Trusteer

IM Wireless Network Assessment
sponsored by Ingram Micro
ASSESSMENT TOOL: The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Ingram Micro

December Information Security Magazine
sponsored by TechTarget Security
EZINE: Everyone in the information security filend knows how hard it is to stay ahead of the rapidly evolving threat landscape. In this month's edition of Information Security, learn about a variety of sercurity issues.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

TechTarget Security

Information Security Emagazine: Best Practices for the Evolving Threat Landscape
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Hewlett-Packard Enterprise

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Endpoint Security IT Decision Center Handbook 3
sponsored by TechTarget Security
EGUIDE: Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

TechTarget Security

Best Practices For Your Threat Management Program
sponsored by IBM
EGUIDE: In this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
Posted: 26 Nov 2013 | Published: 26 Nov 2013

IBM

Endpoint Security Best Practices
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Symantec Corporation

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise