Security Systems Research
-
Cisco 2014 Annual Security Report
Sponsored by: SourcefireThis in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
-
Information Security Magazine – April 2014
Sponsored by: TechTarget SecurityIn this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
-
Secure Network Access for Personal Mobile Devices
Sponsored by: CiscoThis resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
-
Cisco 2014 Annual Security Report
Sponsored by: CiscoThis information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
-
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
Sponsored by: NetIQThis resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
-
Giving Customers Better Protection While Reducing Costs
Sponsored by: ThreatMetrixThis case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
-
Is security a concern of your mobile users?
Sponsored by: CiscoThis brief resource highlights the top 3 mobile user expectations of network connectivity.
-
Five Trends to Track in E-Commerce Fraud
Sponsored by: ThreatMetrixThis paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.
-
ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
Sponsored by: ThreatMetrixThis case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Secunia Vulnerability Review 2014
Sponsored by: SecuniaThis guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
-
Secunia PSI Country Report - Q4 2013 Germany
Sponsored by: SecuniaThis informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
-
Early Leaders Across the Big Data Security Analytics Continuum
Sponsored by: IBMThis informative white paper defines and discusses big data security analytics, including the continuum between real-time and asymmetric big data security analytics solutions.
-
Information Security ASEAN March 2014
Sponsored by: TechTarget SecurityThis ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
-
Information Security ANZ March 2014
Sponsored by: TechTarget SecurityThis issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
-
Modern network security for modern threats
Sponsored by: Palo Alto NetworksThis exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
Detecting Sophisticated Online Attacks with Streaming Analytics
Sponsored by: EMC CorporationDiscover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
-
What’s the Best Focus for MDM Strategy Now?
Sponsored by: TechTarget SecurityThis guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
-
How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
Sponsored by: FireEyeThis white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
-
Combat the Latest Security Attacks with Global Threat Intelligence
Sponsored by: IBMIn this white paper, learn how to approach today's advanced threat landscape by first understanding the source of attacks, then developing threat intelligence to better detect and analyze new threats to help maximize defense efforts.
-
Managing Security Risks and Vulnerabilities
Sponsored by: IBMRead now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
-
Technical Guide on Application Security
Sponsored by: TechTarget SecurityThis expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
-
EMA Report: The Benefits of a Unified Endpoint Management Approach
Sponsored by: IBMRead this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.