Vulnerability Management Research
-
Analyzing Four Widely Exploited Java Vulnerabilities
Sponsored by: FireEyeThis informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
-
Information Security E-Zine – June 2014
Sponsored by: TechTarget SecurityGlobal threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios?
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
15 Point Checklist Cloud Data Protection
Sponsored by: SkyHighThis resource offers 5 exclusive tips for protecting business data across all cloud services.
-
Identity and Access Management Guidelines
Sponsored by: Radiant Logic, Inc.This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
-
Consultants: How Can You Secure Your Information with Customers?
Sponsored by: GlobalscapeThis case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
-
Cyber Preppers Guide
Sponsored by: Threat Track SecurityThis informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
Best Practices for Security and Compliance with Amazon Web Services
Sponsored by: Trend MicroThis resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
-
The Power To Destroy: How Malware Works
Sponsored by: SymantecView this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
-
Combatting Advanced Threats with Endpoint Security Intelligence
Sponsored by: IBMAdvanced security threats are exploding worldwide and the sophistication of these attacks is higher than ever. How can organizations stay ahead of these advanced threats? This white paper discusses how to combat advanced security threats by adopting an integrated, intelligent and automated approach to endpoint security.
-
The Bot Threat
Sponsored by: Hewlett-Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
-
Maintaining Continuous Compliance: A New Best-Practice Approach
Sponsored by: IBMThis resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
-
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Sponsored by: Symantec CorporationTune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
-
Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
Sponsored by: IBMThis white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
-
Keeping Distributed Endpoints Safe and Compliant
Sponsored by: IBMKeeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
-
Webcast: Symantec Internet Security Threat Report 2014
Sponsored by: Symantec CorporationDownload and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
-
Transferring Data without Secure Protocols?
Sponsored by: GlobalscapeThis white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
-
Internet Security Threat Report - 2014
Sponsored by: Symantec CorporationThis in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
Navigating Today's DDoS Landscape
Sponsored by: IxiaLearn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
-
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
Sponsored by: IBMThis informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.