Security Management Research
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
-
Enterprise cloud applications – can we trust them?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
Sponsored by: TechTarget ComputerWeekly.comIn this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
-
Cyber Security 2016 and beyond
Sponsored by: TechTarget ComputerWeekly.comCyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Secure Voting
Sponsored by: TechTarget ComputerWeekly.comThis report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
-
Cisco ASA 5500 Series Adaptive Security Appliances
Sponsored by: Cisco Systems, Inc.Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
-
Protecting SharePoint Data Long Term
Sponsored by: VaronisThis paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
-
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
Sponsored by: SonicWALLThis brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
-
Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
Sponsored by: Shavlik TechnologiesThis Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
Presentation Transcript: The Economics of Endpoint Security
Sponsored by: Sophos UKCheck out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
-
Understanding the Total Cost of Ownership for Endpoint Security Solutions
Sponsored by: SophosWhen moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.
-
Managed Office Protection: Switching from AV to SaaS
Sponsored by: Panda SecurityAntivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
-
Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
Sponsored by: DellEMC and Intel®This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
-
The Top Five Virtualization Mistakes
Sponsored by: Vyatta Inc.This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
-
Cisco IT GRC Security Assessment Service
Sponsored by: Cisco Systems, Inc.Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Cisco Security Solutions - A Reference Guide
Sponsored by: Cisco Systems, Inc.This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
-
The Value of Integrated Security
Sponsored by: Cisco Systems, Inc.Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
-
The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
Sponsored by: IronKeyCheck out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
-
eBook: Virtualization Security
Sponsored by: Informa TechTargetSpace savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
-
eBook: Encryption 360 Degrees
Sponsored by: Informa TechTargetData breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.
-
Presentation Transcript: Automating Virtual Machine Configuration
Sponsored by: ePlus TechnologyLearn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.
-
Magic Quadrant for Endpoint Protection Platforms
Sponsored by: SophosGartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.