Security Architectures Research
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
Sponsored by: InfrascaleThis resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
-
The Fight for Full Network Visibility in a Dangerous World
Sponsored by: APCON, Inc.This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
-
3 Strategies to Manage Compliance Mandates
Sponsored by: CitrixThis white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
-
Guarding the Castle
Sponsored by: DellEMC and Intel®Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. Read this e-book and learn the importance of securing your network every minute of the day against all types of malware, and how a high performance firewall helps you protect against the latest global threats.
-
Taking the Enterprise Mobile: An Executive Checklist
Sponsored by: CitrixThis crucial resource examines a mobile management solution that enables your organization to deliver all of your business critical information over mobile while safeguarding corporate IP, customer and employee data, non-public financial information and business intelligence.
-
MDM and Beyond: Rethinking Mobile Security in a BYOD World
Sponsored by: CitrixThis informative paper discusses how your organization can embrace BYOD with full security and control, providing a simple and streamlined user experience.
-
How Are DDoS Attacks Evolving?
Sponsored by: Neustar®This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Cloud Web Security Using Cisco ASA
Sponsored by: Cisco Systems, Inc.This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
-
Cisco Web Security Appliance
Sponsored by: Cisco Systems, Inc.This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
-
Cisco Email Security
Sponsored by: CiscoThis informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
Sponsored by: Symantec CorporationThis informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
-
Keep Endpoint Data Safe
Sponsored by: Code42This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
-
Sharing Sensitive Corporate Documents without Compromising Security and Governance
Sponsored by: IntraLinks, IncThis informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoThis exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
-
2014 BYOD and Mobile Security Report
Sponsored by: LumensionThis informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
-
Taking Managed Security Services To The Next Level
Sponsored by: OpenText Security SolutionsThis white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
Sponsored by: GartnerAccess the following event brochure to see exactly what will be covered at this year's Gartner Catalyst Conference. Gain a firsthand look at the featured speakers, prices, scheduling, and of course, where you can register.
-
Consumer Web Portals: Platforms at Significant Security Risk
Sponsored by: EMC CorporationThis profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.