Risk Management Research
-
Manage Identity and Access for Continuous Compliance and Reduced Risk
Sponsored by: IBMThis valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
-
Security Trends 2014
Sponsored by: Global KnowledgeIn this resource, find out what you need to know about security trends in 2014.
-
Security Trends 2014
Sponsored by: Global KnowledgeIn this resource, find out what you need to know about security trends in 2014.
-
Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
Sponsored by: AcronisThis white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
-
NSS Labs Network Intrusion Prevention System Product Analysis
Sponsored by: IBMThis resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
-
Supporting the Zero Trust Model of Information Security
Sponsored by: IBMThis Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Cutting the Cost of Application Security
Sponsored by: ImpervaThis white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
-
Guide to OCC updates to governance ruling
Sponsored by: Iron MountainConsult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
-
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
Sponsored by: ImpervaThis guide takes a look at 10 things that every web application firewall should provide.
-
Make Your SIEM the Best It Can Be: Stepping Up Your SIEM Usage
Sponsored by: TechTarget SecurityReceive expert guidance to maximize your SIEM to its utmost potential. View now to learn how you can optimize your SIEM, ramp up its security capabilities for your enterprise, and how to identify authorized access with SIEM best practices.
-
Keeping Distributed Endpoints Safe and Secure
Sponsored by: IBMIn this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
-
Symantec Intelligence Report 2013
Sponsored by: Symantec CorporationThis in-depth report outlines the latest analysis surrounding cyber security threats and trends.
-
Managing Communications for the World of BYOD: Deploying the Right Technology for Today's Mobile World
Sponsored by: RingCentralThis Frost & Sullivan report outlines a key solution that enables mobile workers to experience constant access to business assets while using personal devices. Click through to learn how cloud-based communications services can reduce risk and high cost factors.
-
Application Whitelisting Best Practices: Lessons from the Field
Sponsored by: LumensionThis in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
-
Hidden Lynx – Professional Hackers for Hire
Sponsored by: Symantec CorporationThis in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
-
How much security does your SMB need?
Sponsored by: IBMThis resource is an essential guide for SMBs looking to make the right investments in security to ensure optimum protection.
-
Case Study: County Withstands a Near-Crippling Cyberattack
Sponsored by: Hewlett-Packard EnterpriseIn this case study, discover how San Deigo County withstood this almost devastating attack on election night.
-
How to Protect your Data from Devastating Security Breaches
Sponsored by: Hewlett-Packard EnterpriseDownload this exclusive whitepaper to learn about defining, detecting, defending, and deterring threats before they bring your company to its knees.
-
The Ties That Bind: Aligning Security and Compliance
Sponsored by: TechTarget CIOThis SearchCompliance handbook explains why cooperation between compliance and security departments benefits the entire enterprise, and how these two groups can align their strategic objectives.
-
Security Analytics Security School
Sponsored by: TechTarget SecurityLearn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
-
Information Security Magazine
Sponsored by: TechTarget SecurityIn our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
-
Select the Right Solution for Endpoint Management
Sponsored by: IBMThis guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
Handbook: Vulnerability Management
Sponsored by: TechTarget SecurityThis TechGuide will help you both identify and prioritize vulnerabilities based on sound risk-management principles, ensuring a vulnerability management program that is effective and aligned with broader risk-management goals.