Security Infrastructure Research
-
Five Security Considerations for the Mobile Age
Sponsored by: IBMWhile mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
-
Case Study - System One
Sponsored by: OpenText Security SolutionsThis brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
-
Threat Prevention Techniques: Best Practices for Threat Management
Sponsored by: GeoTrust, Inc.SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
-
SymEd Solutions from Symantec: Endpoint Management and Mobility
Sponsored by: Insight Public Sector and SymantecUncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
-
Online Enemy #1: Blackhole Exploit Kit
Sponsored by: Threat Track SecurityThis short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
-
It’s Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
-
Oracle Database Security: Cost Effective Security and Compliance
Sponsored by: Oracle Corporation UK LtdRead this exclusive resource that will help you develop a defense-in-depth, inside-out security strategy to better protect your organization from sophisticated, complex data threats.
-
Antivirus: The Hippest New Apple Accessory
Sponsored by: Threat Track SecurityFor organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
-
Network Security Report: The State of Network Security in Schools
Sponsored by: Threat Track SecurityAccess this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.
-
Closing the security gap: 2012 IOUG enterprise data security survey
Sponsored by: Oracle Corporation UK LtdThis exclusive paper surveys 350 data center managers to find out what the most prevalent threats are to data security today. Discover what your peers are doing to overcome these challenges, and learn helpful strategies for safeguarding your critical information.
-
Complete and Scalable Access Management
Sponsored by: Oracle Corporation UK LtdThis comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
-
Achieve secure mobile access to enterprise applications
Sponsored by: Oracle Corporation UK LtdThis brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
-
Unlocking the Opportunity of SIEM Technology
Sponsored by: TechTarget SecurityExplore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
The Future of Next-Generation SIEM
Sponsored by: TechTarget SecurityThis expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
-
Security Information Management Systems Aspire to Real-Time Security
Sponsored by: Hewlett Packard EnterpriseExplore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
-
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
Sponsored by: InfobloxUncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
-
Security Information Management Systems and Application Monitoring
Sponsored by: TechTarget SecurityDid you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
-
Enterprise Security: Why you need Effective Log Management
Sponsored by: TechTarget SecurityFor many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
-
Evaluating Wireless Intrusion Prevention
Sponsored by: AirTight Networks, Inc.This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.
-
Security in the Age of Mobility
Sponsored by: Trend MicroThis resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
-
Computer Weekly – 2 April 2013: The benefits of context-aware security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
-
The Health Care Cloud: Increasing the Need for Disaster Recovery
Sponsored by: HP & Intel®This e-guide explores how, as EHR vendors venture into the cloud, the need for improved disaster recovery and security policies is becoming more apparent.
-
Information Security Magazine - March 2013
Sponsored by: TechTarget SecurityThis issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.