Security Software Research
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionProtecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
-
How to Achieve Device Control Peace of Mind
Sponsored by: LumensionUncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
-
PassMark Report: Enterprise Endpoint Security Performance Benchmarks
Sponsored by: Symantec CorporationThis PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.
-
Handbook: Identity and Access Management
Sponsored by: TechTarget SecurityIn this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
IBM: An Early Leader across the Big Data Security Analytics
Sponsored by: IBMSecurity data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Identity and Access Management Buyer's Guide
Sponsored by: IBMThis buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
-
Information Security Essential Guide: The Evolution of Threat Detection and Management
Sponsored by: TechTarget SecurityThis Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
-
SIEM Demo: Get Complete Security Visibility in an Hour
Sponsored by: AT&T CybersecurityWatch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
-
Panda Cloud Systems Management: Reports Datasheet
Sponsored by: Panda SecurityThis crucial paper examines a cloud-based IT management solution that provides detailed and measurable reports to justify time spent and show all of the actions you have taking remotely preventing and managing problems.
-
Best Practices for Improving Mobile Data Security
Sponsored by: TechTarget SecurityThis expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
-
Panda Cloud Systems Management: Management Datasheet
Sponsored by: Panda SecurityAccess this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity.
-
Panda Security and Delta Wines - Case Study
Sponsored by: Panda SecurityRead about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up.
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Panda Security and Minopex - Case Study
Sponsored by: Panda SecurityLearn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise.
-
Rethink Defense-In-Depth Security Model For BYOD
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
-
Shift Your Thinking on Endpoint Protection
Sponsored by: CenterBeamIn this e-guide, SearchSecurity.com experts explain the state of endpoint security and why it's time to change our endpoint protection approach. View now to learn more.
-
A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
Sponsored by: TechTarget SecurityIn this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
-
Malware Attacks Demand a New Malware Defense Approach
Sponsored by: TechTarget SecurityCustomized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
-
Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
Sponsored by: OpenText Security SolutionsThis resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
-
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
Sponsored by: OpenText Security SolutionsThis performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
-
Five Security Considerations for the Mobile Age
Sponsored by: IBMWhile mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
-
Case Study - System One
Sponsored by: OpenText Security SolutionsThis brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.