Security Infrastructure Research
-
Mitigating Email Virus Attacks
Sponsored by: CiscoAccess this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
-
Cisco 2014 Annual Security Report
Sponsored by: SourcefireThis in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
-
Secure Network Access for Personal Mobile Devices
Sponsored by: CiscoThis resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
-
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
Sponsored by: NetIQThis resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
-
International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT
Sponsored by: CiscoThis resource contains the results of an international survey on enterprise mobility, consumerization, and mobile security, and also includes considerations for IT departments in light of this new information.
-
Modern network security for modern threats
Sponsored by: Palo Alto NetworksThis exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
-
Selecting a Safe and Smart Surveillance Drive
Sponsored by: Seagate TechnologyCheck out this white paper to find a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use. Read on and find out which storage controller may be the one that meets your organization's needs.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
Taking Your Enterprise Mobile: The Executive Checklist
Sponsored by: CitrixThis informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
-
Achieve Deeper Network Security and Application Control
Sponsored by: DellEMC and Intel®Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
-
Secure Mobile Devices with a Next Generation Firewall
Sponsored by: Dell SoftwareThis white paper provides one suggestion for securing your mobile devices with a next generation firewall.
-
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
Sponsored by: GlobalscapeThis whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
-
Technical Guide on Application Security
Sponsored by: TechTarget SecurityThis expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
-
EMA Report: The Benefits of a Unified Endpoint Management Approach
Sponsored by: IBMRead this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
-
Leverage Security Intelligence for Government Agencies
Sponsored by: IBMThis resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
-
A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
Sponsored by: IBMThis guide discusses security leaders' top concerns with today's aggressive threat landscape.
-
Securing Android, iOS and Windows Tablets and Smartphones
Sponsored by: CitrixThis informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
-
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
Sponsored by: DellEMC and Intel®This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
-
Understanding and Selecting Data Masking Solutions
Sponsored by: IBMThis white paper examines data masking technology, and pinpoints the must-have features to look for when choosing a solution.
-
Unified Communications Security
Sponsored by: NextPlaneThis crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
-
Behavioral Analytics Applied to Security
Sponsored by: FileTrekThis white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
-
Unified Threat Management: RFP Technology Decisions
Sponsored by: TechTarget SecurityTo properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
-
Unified Threat Management: Decision Time
Sponsored by: TechTarget SecurityLearn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.