Security Systems Research
-
10 Essential Elements for a Secure Enterprise Mobility Strategy
Sponsored by: CitrixThis resource guides you through the top 10 considerations when developing a mobile strategy.
-
Detecting and Preventing Retail Cyber Crime
Sponsored by: LogRhythm, Inc.Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
-
Case Study - Anittel Simplifies Managed AV Service
Sponsored by: OpenText Security SolutionsThis informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
-
A Guide to Password Use in WebSphere Application Server
Sponsored by: Global KnowledgeLearn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Phishing and Web Security
Sponsored by: OpenText Security SolutionsThis brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Providence Health & Services is Reacting to Threats Five Times Faster
Sponsored by: Symantec CorporationThis case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
Avoid HIPAA Compliance Violations Amid the Rise of BYOD
Sponsored by: ImprivataThis expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Advanced Malware Protection for your Web and Email Gateways
Sponsored by: Cisco Systems, Inc.This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
-
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
Sponsored by: Symantec CorporationThis informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
-
Keep Endpoint Data Safe
Sponsored by: Code42This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
-
Advanced Malware Protection for your Email Services
Sponsored by: Cisco Systems, Inc.This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
-
Web Security: Advanced Malware Protection
Sponsored by: Cisco Systems, Inc.This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.
-
Retail Cyber Crime
Sponsored by: LogRhythm, Inc.This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
-
Cisco 2014 Annual Security Report
Sponsored by: Cisco Systems, Inc.This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
-
EMC Video Surveillance Storage Solution
Sponsored by: EMC & ArrowWatch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
-
Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
Sponsored by: OpenText Security SolutionsThis guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
The Critical Incident Response Maturity Journey
Sponsored by: EMC CorporationThis paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
-
From SIEM to Security Analytics: The Path Forward
Sponsored by: EMC CorporationWatch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
-
10 Network Security Tools and Tests Everyone Should Use
Sponsored by: Global KnowledgeThis paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.