Security Architectures Research
-
Third Annual Juniper Networks Mobile Threats Report
Sponsored by: IBM and JuniperThis exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.
-
Transitioning to the Private Cloud with Confidence
Sponsored by: CiscoCloud computing may be the future of IT, but it also presents challenges businesses can't afford to overlook. Review the key characteristics, business benefits and barriers when moving to a private cloud.
-
Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
Sponsored by: IBMIBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
-
How to Make Your Business More Flexible & Cost Effective?
Sponsored by: Panda SecurityAccess this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
-
Panda Cloud Systems Management: Monitor Datasheet
Sponsored by: Panda SecurityThis informative paper discusses a cloud-based IT management solution that anticipates problems proactively, monitoring device activity through mediums such as alerts, dashboards and tickets so you can deal with incidents before they cause problems.
-
Panda Security and Delta Wines - Case Study
Sponsored by: Panda SecurityRead about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up.
-
Dell DVS Enterprise - Mobile Secure Desktop
Sponsored by: Dell and VMwareThis informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device.
-
Cloud security, options and trends
Sponsored by: CenterBeamIn this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.
-
The Hay Group Case Study
Sponsored by: CenterBeamThis brief case study takes a look at how the Hay Group, a global management consulting firm, teamed up with a third party to integrate its fleet management and service desk initiatives. Read now to learn how they addressed the needs of three key areas of their IT environment – endpoint management and security, data protection, and helpdesk.
-
Solitarie Interglobal: Tracked, Hacked and Attacked
Sponsored by: IBM.Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
-
Case Study - System One
Sponsored by: OpenText Security SolutionsThis brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
-
Threat Prevention Techniques: Best Practices for Threat Management
Sponsored by: GeoTrust, Inc.SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
-
SymEd Solutions from Symantec: Endpoint Management and Mobility
Sponsored by: Insight Public Sector and SymantecUncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
-
Online Enemy #1: Blackhole Exploit Kit
Sponsored by: Threat Track SecurityThis short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
-
It’s Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
-
Unlocking the Opportunity of SIEM Technology
Sponsored by: TechTarget SecurityExplore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
The Future of Next-Generation SIEM
Sponsored by: TechTarget SecurityThis expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
-
Security Information Management Systems Aspire to Real-Time Security
Sponsored by: Hewlett Packard EnterpriseExplore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
-
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
Sponsored by: InfobloxUncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
-
Security Information Management Systems and Application Monitoring
Sponsored by: TechTarget SecurityDid you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
-
Agentless Security for Vmware Virtual Data Centers and Cloud
Sponsored by: Trend MicroThis resource will help you understand how applying traditional architectures to virtual environments can hurt your organization's productivity and security posture, and what you need to do in order to secure your virtual environment effectively. Read on to learn more.
-
Computer Weekly – 2 April 2013: The benefits of context-aware security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
-
APT Defense Mechanisms and Best Practices
Sponsored by: InfobloxUncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
-
The Demise in Effectiveness of Signature and Heuristic Based Antivirus
Sponsored by: TechTarget ComputerWeekly.comAnti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.