Security Managers Research
-
Web Security: Advanced Malware Protection
Sponsored by: Cisco Systems, Inc.This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.
-
Taking Managed Security Services To The Next Level
Sponsored by: OpenText Security SolutionsThis white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
-
Policy Based Encryption: Protecting your Business Against Email Risks
Sponsored by: ApptixThis white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
-
Data Privacy: Where Should I House My Data?
Sponsored by: IntraLinks, IncThis white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
The Critical Incident Response Maturity Journey
Sponsored by: EMC CorporationThis paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
A Roadmap for Big Data in Security Analytics
Sponsored by: EMC CorporationStarting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
-
Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
Sponsored by: EMC CorporationTo develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
-
The Big Data Security Analytics Era is Here
Sponsored by: EMC CorporationBig data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
Unique Capabilities for Protecting Data in Enterprise Hospital Environments
Sponsored by: BridgeHead SoftwareThis white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
-
The CIO’s Guide to HIPAA Compliant Text Messaging
Sponsored by: ImprivataThis resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
Evaluating the True Impact of Fraud on Financial Institution
Sponsored by: IBMThis guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
-
A UK Security Provider Fortifies its Systems for Greater Resiliency
Sponsored by: IBMThis informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
Sponsored by: IBMThis whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
-
How to Leverage Free Tools to Secure Web Apps
Sponsored by: ImpervaExpert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Software Security for Web Developers: Providing a Helping Hand
Sponsored by: ImpervaThis expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
-
Avoiding Compliance and Shadow IT Risks in the Cloud
Sponsored by: CloudPassageThis expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Executive Guide to SYSPRO Security for Auditing Assurance and Control
Sponsored by: SysproThis white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.