Security Infrastructure Research
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: UnitedLexWhile global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
-
The top threat intelligence services for enterprises
Sponsored by: UnitedLexIf threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
-
The Need-to-Know of Today's Cloud Security
Sponsored by: TechTarget Cloud ComputingIn this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
-
Why it's Time for Locked-Down Desktops
Sponsored by: Dell, Microsoft and CitrixAccess this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.
-
Physical vs. Virtual Desktop Security: It's Just Not The Same
Sponsored by: Dell, Inc. and Intel®This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
Sponsored by: Symantec Website SecurityThis e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
Breaking the Cyber Attack Lifecycle
Sponsored by: Palo Alto NetworksThis white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Keep Your Data Secure: Fighting Back With Flash
Sponsored by: Micron TechnologySelf-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
-
Secure Mobile Email for the Lean IT Department
Sponsored by: Shavlik TechnologiesThis expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
-
What to Look for in Web Application Firewall Products
Sponsored by: TechTarget SecurityIn this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
How SIEM Helps IT Security, Compliance, Operations and Management
Sponsored by: CDW CorporationSecurity information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
-
Vendor Landscape: Intrusion Detection and Prevention Systems
Sponsored by: IBMThis comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
IT Executive Guide to Security Intelligence
Sponsored by: IBMThis helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
-
BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
Sponsored by: SophosThis informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Data Security for Mobile Users: One Size Does Not Fit All
Sponsored by: Accellion, Inc.Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
-
A Manifesto for Cyber Resilience
Sponsored by: Symantec CorporationIn this white paper, find out what it takes to become cyber resilient in this age of escalating threats.