Security Managers Research
-
Adapting to the new web security and email security threats
Sponsored by: Cisco Systems, Inc.In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
-
How Are DDoS Attacks Evolving?
Sponsored by: Neustar®This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
Sponsored by: Neustar®This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
-
Navigating Today's DDoS Landscape
Sponsored by: IxiaLearn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
-
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
Sponsored by: IBMThis informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
-
Information Security – May 2014
Sponsored by: TechTarget SecurityThe online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
10 Essential Elements for a Secure Enterprise Mobility Strategy
Sponsored by: CitrixThis resource guides you through the top 10 considerations when developing a mobile strategy.
-
Case Study - Anittel Simplifies Managed AV Service
Sponsored by: OpenText Security SolutionsThis informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Phishing and Web Security
Sponsored by: OpenText Security SolutionsThis brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
-
Common Use of Mobile Devices Makes Strong Case for Strong BYOD
Sponsored by: TigerText, Inc.Access this expert e-guide from SearchHealthIT.com to learn more about the benefits and challenges to consider before implementing BYOD policies.
-
Healthcare Mobile Device Support Means Security Management
Sponsored by: TigerText, Inc.This expert e-guide from SearchHealthIT.com highlights two leading HCOs successful experiences with implementing secure BYOD programs. Click through to unveil 8 mobile device security tactics and policies to help you achieve similar results.
-
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
Sponsored by: Symantec CorporationView this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Providence Health & Services is Reacting to Threats Five Times Faster
Sponsored by: Symantec CorporationThis case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
-
Simplify implementation of the HITRUST Common Security Framework
Sponsored by: Symantec CorporationClick through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
-
Industry Perspectives: The Impact of HIPAA and HITECH
Sponsored by: Symantec CorporationThis white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
HIPAA Compliance in a BYOD Environment
Sponsored by: ImprivataAccess this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
-
Avoid HIPAA Compliance Violations Amid the Rise of BYOD
Sponsored by: ImprivataThis expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Advanced Malware Protection for your Email Services
Sponsored by: Cisco Systems, Inc.This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.