Vulnerability Management Research
-
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
Sponsored by: IBMGain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
Managing User Identities and Access in the Cloud
Sponsored by: IBMLearn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Vendor Landscape: Intrusion Detection and Prevention Systems
Sponsored by: IBMThis comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
-
HP Fortify on Demand
Sponsored by: Hewlett Packard EnterpriseAccess this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Enterprise Information Security in Transition
Sponsored by: IBMThis white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMThis white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
Advanced Persistent Threats: Detection, Protection and Prevention
Sponsored by: SophosDownload this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
-
Network Protection and UTM Buyer's Guide
Sponsored by: SophosThis white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
-
Five critical steps to achieving an effective application security program
Sponsored by: IBMThis white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
A Manifesto for Cyber Resilience
Sponsored by: Symantec CorporationIn this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
-
Defending Against Application-Layer DDoS Attacks
Sponsored by: Juniper Networks, Inc.This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
-
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
Sponsored by: Threat Track SecurityThis informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
Sponsored by: FireEyeThis informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
-
Can a Federated Identity Service Strengthen SSO?
Sponsored by: Radiant Logic, Inc.With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
-
Beyond the Breach
Sponsored by: FireEyeThis informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
-
Analyzing Four Widely Exploited Java Vulnerabilities
Sponsored by: FireEyeThis informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.