Vulnerability Management Research
-
Web Security: Advanced Malware Protection
Sponsored by: Cisco Systems, Inc.This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.
-
Discovering Vulnerable Web Applications
Sponsored by: QualysThis paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
The Critical Incident Response Maturity Journey
Sponsored by: EMC CorporationThis paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
-
10 Network Security Tools and Tests Everyone Should Use
Sponsored by: Global KnowledgeThis paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
Evaluating the True Impact of Fraud on Financial Institution
Sponsored by: IBMThis guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
Advanced Persistent Threats: Detection, Protection and Prevention
Sponsored by: SophosDownload this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Cisco 2014 Annual Security Report
Sponsored by: CiscoThis information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
-
Secunia Vulnerability Review 2014
Sponsored by: SecuniaThis guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
-
Breaking Through the GRC Value Ceiling
Sponsored by: EMC CorporationThis paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
-
Detecting Sophisticated Online Attacks with Streaming Analytics
Sponsored by: EMC CorporationDiscover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
-
Managing Security Risks and Vulnerabilities
Sponsored by: IBMRead now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
-
Leverage Security Intelligence for Retail
Sponsored by: IBMThis informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
-
An Integrated Approach to Managing Application Security
Sponsored by: IBMThis white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
-
Protect People, Processes, and Technology From Web Application Threats
Sponsored by: IBMThis resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
-
Insider Edition: Antimalware Technologies and Techniques to the Rescue
Sponsored by: TechTarget SecurityIn this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
-
The Definitive Guide to the Next Generation of Threat Protection
Sponsored by: FireEyeThis in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
-
Symantec Intelligence Report - January 2014
Sponsored by: Symantec CorporationThis in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
-
Advanced Attacks Require Federal Agencies to Reimagine IT Security
Sponsored by: FireEyeThis guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.