Security Systems Research
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Banca Intesa Counters Threats with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseExplore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
Sponsored by: FireEyeThis informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
TELUS leverages HP ArcSight and TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
The File Transfer Security Evolution
Sponsored by: GlobalscapeThis white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
It's Time to Simplify Large File Exchanges
Sponsored by: GlobalscapeAccess this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
-
Consultants: How Can You Secure Your Information with Customers?
Sponsored by: GlobalscapeThis case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
-
Protecting Critical Data is a Main Priority for the U.S. Army
Sponsored by: GlobalscapeIn this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
Cyber Preppers Guide
Sponsored by: Threat Track SecurityThis informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
Sponsored by: ClearswiftIn this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
-
Best Practices for Security and Compliance with Amazon Web Services
Sponsored by: Trend MicroThis resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
-
The Surprising Affordability of Today’s Cloud Archive
Sponsored by: InfrascaleThis resource explains why cloud data archive is a more secure and reliable backup option over legacy tape solutions for MSPs.
-
A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
Sponsored by: InfrascaleThis resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
-
Phishing: The Latest Tactics And Potential Business Impacts
Sponsored by: SymantecThis informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
-
The Power To Destroy: How Malware Works
Sponsored by: SymantecView this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
-
Combatting Advanced Threats with Endpoint Security Intelligence
Sponsored by: IBMAdvanced security threats are exploding worldwide and the sophistication of these attacks is higher than ever. How can organizations stay ahead of these advanced threats? This white paper discusses how to combat advanced security threats by adopting an integrated, intelligent and automated approach to endpoint security.
-
The Business Value of Integrated Anti-Virus Management
Sponsored by: IBMThis white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
-
The Bot Threat
Sponsored by: Hewlett-Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
-
Maintaining Continuous Compliance: A New Best-Practice Approach
Sponsored by: IBMThis resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.