Security Threats Research
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Security Intelligence Is the Smart Way to Keep the Cloud Safe
Sponsored by: IBMFind out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Vendor Landscape: Intrusion Detection and Prevention Systems
Sponsored by: IBMThis comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
-
Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
Sponsored by: Hewlett-Packard EnterpriseAccess this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
-
Security for a Faster World
Sponsored by: Hewlett Packard EnterpriseThis eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
-
Top 5 Truths About Big Data Hype and Security Intelligence
Sponsored by: Hewlett Packard EnterpriseThis resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
-
HP Fortify on Demand
Sponsored by: Hewlett Packard EnterpriseAccess this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
-
3 Big data security analytics techniques you can apply now to catch advanced persistent threats
Sponsored by: Hewlett Packard EnterpriseIn this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
From Campus LAN to Borderless Networks
Sponsored by: TechTarget NetworkingLearn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
-
Minimise the Security Risks of Mobile Email Access
Sponsored by: Hewlett-Packard EnterpriseThis expert e-guide will teach you how to put airtight security measures on remote e-mail access.
-
What's Behind a Cyber Attack?
Sponsored by: IBMThis white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
-
Enterprise Information Security in Transition
Sponsored by: IBMThis white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMThis white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
Sponsored by: IderaDBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
-
Advanced Persistent Threats: Detection, Protection and Prevention
Sponsored by: SophosDownload this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
-
IT Executive Guide to Security Intelligence
Sponsored by: IBMThis helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
-
BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
Sponsored by: SophosThis informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
-
Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
Sponsored by: SophosThis buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
-
Unified Threat Management Guide
Sponsored by: SophosThis guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Information Security ANZ July 2014
Sponsored by: TechTarget SecurityThis ezine looks at how will new privacy laws impact IT departments in Australia?
-
Information Security ASEAN July 2014
Sponsored by: TechTarget SecurityThis issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?