Security Architectures Research
-
The top threat intelligence services for enterprises
Sponsored by: UnitedLexIf threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
-
Targeted Cyber Attacks: Infecting the Victim
Sponsored by: UnitedLexThis e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.
-
Cybersecurity Risks Masked by Controversial Vulnerability Counts
Sponsored by: Symantec Website SecurityIn this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
-
Can A Subscription Ease SSL Certificate Management?
Sponsored by: Symantec Website SecurityThis e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
-
Organizations Struggle through a Tough Year for SSL Protocols
Sponsored by: Symantec Website SecurityIn this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.
-
Find the Right EFSS to Secure Employee File Sharing
Sponsored by: Trend Micro, Inc.This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.
-
Virtual Desktop Security: Exploring VDI Features
Sponsored by: Dell, Inc. and Intel®This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
Sponsored by: Symantec Website SecurityThis e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
Swiss Army Knife Security? How to Vet Integrated Tool Sets
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
-
Information Security Magazine: November Issue
Sponsored by: TechTarget SecurityWhat strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?
-
The Economics of Defense: Modeling Security Investments Against Risk
Sponsored by: Juniper Networks, Inc.There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.
-
Keep Your Data Secure: Fighting Back With Flash
Sponsored by: Micron TechnologySelf-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
-
Protecting This House: IT's Role in Cloud Security
Sponsored by: TechTarget Cloud ComputingHaving a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Data Loss Prevention: RFP Technology Decisions
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
WAN Optimization: Expert Guidelines to Management and Security
Sponsored by: TechTarget NetworkingWhat is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
-
IT Executive Guide to Security Intelligence
Sponsored by: IBMThis helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
-
Insights and Recommendations for Top Security Concerns; Annual Security Report
Sponsored by: Cisco Systems, Inc.This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
-
HP TippingPoint Provides Next-Generation Network Security
Sponsored by: Hewlett Packard EnterpriseThis informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
Sponsored by: Palo Alto NetworksJoin this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
-
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
Sponsored by: BitGlassIn this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
-
Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
Sponsored by: NEC Corporation of AmericaThis crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.