Security Systems Research
-
10 Ways to Build a Better Big Data Security Strategy
Sponsored by: Hewlett-Packard EnterpriseThis informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
-
Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
Sponsored by: IBMThis white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
-
Keeping Distributed Endpoints Safe and Compliant
Sponsored by: IBMKeeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
-
The Fight for Full Network Visibility in a Dangerous World
Sponsored by: APCON, Inc.This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
-
Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
Sponsored by: IBMThis resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
-
Preventing Dangerous File-Sharing
Sponsored by: GlobalscapeThis resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
-
Transferring Data without Secure Protocols?
Sponsored by: GlobalscapeThis white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
-
Cybersecurity Is Every CIO's Problem
Sponsored by: TechTarget CIOThis CIO handbook gives you the knowledge you need to create cybersecurity that not only keeps you safe, but also builds trust among consumers and other businesses.
-
4 Secrets to Meaningful Security Discussions with the Board of Directors
Sponsored by: CitrixThis informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
-
Internet Security Threat Report - 2014
Sponsored by: Symantec CorporationThis in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
-
Adapting to the new web security and email security threats
Sponsored by: Cisco Systems, Inc.In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
-
How Are DDoS Attacks Evolving?
Sponsored by: Neustar®This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
Security Testing For Financial Institutions
Sponsored by: IxiaSecurity breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis.
-
A Six-Step Plan for Competitive Device Evaluations
Sponsored by: IxiaDiscover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
Sponsored by: Neustar®This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
-
Navigating Today's DDoS Landscape
Sponsored by: IxiaLearn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
-
Testing the Cloud: Definitions, Requirements, and Solutions
Sponsored by: IxiaTesting of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
-
Which Endpoint Security Service is Best? Breaking Down 5 Top Solutions
Sponsored by: OpenText Security SolutionsThis guide explores the management functionality of five cloud endpoint security services, along with the process needed to identify an effective anti-malware product for your clients' environments.
-
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
Sponsored by: IBMThis informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
10 Essential Elements for a Secure Enterprise Mobility Strategy
Sponsored by: CitrixThis resource guides you through the top 10 considerations when developing a mobile strategy.