Vulnerability Management Research
-
Endpoint Security IT Decision Center Handbook 2
Sponsored by: TechTarget SecurityAccess this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
How Can You Avoid a Web Security Breach? It's All in the Preparation
Sponsored by: TechTarget SecurityIn this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: TechTarget SecurityErrors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: TechTarget SecurityExpert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
-
Better Security Intelligence for the Finance Industry
Sponsored by: IBMA security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
-
Three Guiding Principles to Improve Data Security and Compliance
Sponsored by: IBMIn this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
-
QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
Sponsored by: IBMThis white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
-
EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
Sponsored by: IBMMany security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
-
Information Security Emagazine: Best Practices for the Evolving Threat Landscape
Sponsored by: Hewlett-Packard EnterpriseIn this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
-
Best Practices For Your Threat Management Program
Sponsored by: IBMIn this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
-
The Tangled Web of Data Privacy Issues
Sponsored by: Thawte Inc.In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Strong Authentication: Achieve the Level of Identity Assurance You Need
Sponsored by: HID GlobalIn this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
-
Making the Most of BYOD Opportunities
Sponsored by: Dell and VMwareAccess this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.
-
IBM X-Force 2013 Mid-Year Trend and Risk Report
Sponsored by: IBMIn this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
-
WatchGuard- Data Loss Prevention
Sponsored by: WatchGuard Technologies, Inc.This infographic will help you learn critical information about data security and the challenges today’s business face when it comes to keeping data safe.
-
A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
Sponsored by: IBMAccess this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
Provide Better Visibility and Manageability across Network Security Tools
Sponsored by: WatchGuard Technologies, Inc.Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment.
-
Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
Sponsored by: Symantec CorporationAccess this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.
-
Symantec Intelligence Report - August 2013
Sponsored by: Symantec CorporationIn this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
-
The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
Sponsored by: Symantec CorporationSearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
Proactive data security, audit and compliance solutions
Sponsored by: IBMAccess this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
-
Endpoint Security: Anti-Virus Alone is Not Enough
Sponsored by: LumensionAccess this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
-
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
Sponsored by: LumensionIn this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.