Security Managers Research
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
The Keys to Securing Data in a Collaborative Workplace
Sponsored by: Dropbox for BusinessThis white paper introduces 5 steps you can take to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Evaluating File Sync and Share Security
Sponsored by: Dropbox for BusinessThis white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
-
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
Sponsored by: BitGlassIn this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
-
5 Ways Dropbox for Business Keeps Your Data Protected
Sponsored by: Dropbox for BusinessThis white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
A Comprehensive Guide to Encryption Technology Approaches
Sponsored by: VormetricThis resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
-
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
Sponsored by: VormetricThis white paper defines the global legal obligations and financial services laws that require data encryption.
-
Building a Better Network Security Strategy
Sponsored by: Hewlett Packard EnterpriseThis informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
-
6 Ways to Enhance Security in AWS
Sponsored by: SafeNet, Inc.In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Can a Federated Identity Service Strengthen SSO?
Sponsored by: Radiant Logic, Inc.With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
-
The Insider Threat of Bring Your Own Cloud (BYOC)
Sponsored by: SkyHighThis Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
-
Cloud Adoption & Risk Report
Sponsored by: SkyHighThis survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
-
Managing Cloud Adoption and Risk
Sponsored by: SkyHighThis 12-item checklist is to help IT pros securely fulfill a cloud adoption.
-
Banca Intesa Counters Threats with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseExplore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
TELUS leverages HP ArcSight and TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
-
15 Point Checklist Cloud Data Protection
Sponsored by: SkyHighThis resource offers 5 exclusive tips for protecting business data across all cloud services.
-
The File Transfer Security Evolution
Sponsored by: GlobalscapeThis white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
-
Case Study: Globalscape® WAFS Expands the Panama Canal
Sponsored by: GlobalscapeThis case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
It's Time to Simplify Large File Exchanges
Sponsored by: GlobalscapeAccess this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.