Internet Security Research
-
E-commerce and Consumer Retailing: Risks and Benefits
Sponsored by: ISACAISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges.
-
Presentation Transcript: Making Time for Endpoint Security
Sponsored by: BigFixThis presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.
-
Top 10 Tips to Keep Your Small Business Safe
Sponsored by: Trend Micro, Inc.Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.
-
Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models
Sponsored by: AVG Technologies USA, Inc.Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing.
-
BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
Sponsored by: IBMRead this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
-
Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking
Sponsored by: AVG Technologies USA, Inc.This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.
-
Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.
Sponsored by: AVG Technologies USA, Inc.Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.
-
MegaPath Site-to-Site MPLS VPN
Sponsored by: MegaPath Inc.Your employees in remote locations need the same fast, reliable, secure and cost-effective access to information and applications as your employees at headquarters. MegaPath Site-to-Site MPLS VPN is the simple solution. Read this white paper to learn how to MegaPath Site-to-Site MPLS VPN means more security, more selection, and more service.
-
Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
Sponsored by: SophosWeb security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
-
Information Security Magazine - February 2010: Under Control
Sponsored by: Information Security MagazineFeature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
-
Designing a Strategy for End-to-End Web Protection
Sponsored by: IBMWeb applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
Sponsored by: iovation, Inc.Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
-
Symantec Internet Security Threat Report: Trends for 2008
Sponsored by: Symantec CorporationThis report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
-
Presentation Transcript: Phishing and the Underground Economy
Sponsored by: MarkMonitorThis document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
-
IBM Internet Security Systems X-Force® 2008 Mid-Year Trend Statistics
Sponsored by: IBMRead this white paper to discover the implications, so you can enhance information security for the rest of 2008 and beyond.
-
Enterprise Risk Management in the Financial Services Industry: International Benchmark Survey May 2007
Sponsored by: SASThis report presents the 2007 results of SAS' annual international benchmark survey on enterprise risk management (ERM) in the financial services industry.
-
Symantec Internet Security Threat Report: Trends for July-December 07
Sponsored by: Symantec CorporationThis summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
-
Unified Threat Management: The Best Defense against Blended Threats
Sponsored by: SonicWALLThe SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
-
The Cybercrime Arms Race
Sponsored by: KasperskyRead this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
-
Drive business value with innovation for security defense
Sponsored by: IBMThis white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
-
Cyber Attacks on the Rise: IBM 2007 Report
Sponsored by: IBMThis white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
-
Kaspersky Internet Security 7.0
Sponsored by: KasperskyTry this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
-
Global Threat Research Report: Russia
Sponsored by: VeriSign, IncThis report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
-
The Case for Application Security: How Real Is the Threat and What Are Your Options
Sponsored by: Fortify SoftwareThis white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.