Security Software Research
-
Buyer's Guide to Antimalware
Sponsored by: TechTarget SecurityCompanies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
-
E-Guide: How to build a toolset to avoid Web 2.0 security issues
Sponsored by: TechTarget SecurityCollaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
-
Protect sensitive data with multiple layers of loss protection
Sponsored by: CDW HealthcareThis healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.
-
Top Ten IT Systems Management Pain Points
Sponsored by: KaseyaManaging the IT infrastructure for small and mid-sizedcompanies is a thankless job. People just don’tunderstand the expertise, time and patience required.Kaseya presents the top ten IT management pain pointsand our solution for making your life easier.
-
InfoSphere Warehouse 9.7 data sheet
Sponsored by: IBMAccess to timely, accurate information is critical as enterprises strive to boost competitiveness and innovation.
-
GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
Sponsored by: GlobalSignThis white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
-
Protect sensitive data with multiple layers of loss protection
Sponsored by: CDW HealthcareThis healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.
-
IT Decision Checklist: Virtual Desktop Infrastructure Security
Sponsored by: AstaroVDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.
-
A Pragmatic Approach to SIEM
Sponsored by: Tripwire, Inc.In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
-
Windows Azure Platform Security Essentials: Module 1 - Security Architecture
Sponsored by: MicrosoftIn this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
-
E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
Sponsored by: NETGEAR Inc.If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
-
Application Security Assessment Options
Sponsored by: Security InnovationThis scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems.
-
IT Decision Checklist: Virtual Desktop Infrastructure Security
Sponsored by: Trend MicroTraditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.
-
eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
Sponsored by: RES SoftwareToday’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how ties security to...
-
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
Sponsored by: Trend Micro, Inc.This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
-
Slipping Through The Cracks Of Web Services To Serve Malware
Sponsored by: Trend Micro, Inc.Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
-
Threat Containment for Facebook
Sponsored by: BlueCoatThis technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
-
Data Leak Protection Planning
Sponsored by: (ISC)2 UK LtdIt's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.
-
10 Steps to Email Security
Sponsored by: ClearswiftThis white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
-
Meeting the challenges of virtualisation security
Sponsored by: Trend MicroYour organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges.
-
TechTarget ANZ Securing Virtualised Data Centres E-Book
Sponsored by: Trend MicroVirtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet, Inc.This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
-
Total Economic Impact™ of Trend Micro Enterprise Security
Sponsored by: Trend Micro, Inc.The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
-
Securing Virtualised Environments and Accelerating Cloud Computing
Sponsored by: CA TechnologiesThere is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
-
Privileged user management: It's time to take control
Sponsored by: CA TechnologiesIT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.