Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014
|
|
|
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER:
Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014
|
|
|
A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER:
In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014
|
|
|
Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER:
This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014
|
|
|
Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER:
This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014
|
|
|
Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER:
This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014
|
|
|
Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER:
This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014
|
|
|
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER:
This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014
|
|
|
A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER:
This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012
|
|
|
Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014
|
|
|
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER:
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014
|
|
|
Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER:
With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013
|
|
|
Beyond the Breach
sponsored by FireEye
WHITE PAPER:
This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014
|
|
|
Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER:
This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014
|
|
|
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER:
This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014
|
|
|
Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER:
This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014
|
|
|
The File Transfer Security Evolution
sponsored by Globalscape
WHITE PAPER:
This white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
Posted: 27 May 2014 | Published: 31 Dec 2013
|
|
|
It's Time to Simplify Large File Exchanges
sponsored by Globalscape
WHITE PAPER:
Access this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
Posted: 23 May 2014 | Published: 23 May 2014
|
|
|
Consultants: How Can You Secure Your Information with Customers?
sponsored by Globalscape
WHITE PAPER:
This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014
|
|
|
How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER:
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014
|
|
|
Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER:
This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014
|
|
|
Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER:
This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014
|
|
|
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER:
In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014
|
|
|
Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER:
This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013
|
|
|
The Surprising Affordability of Today’s Cloud Archive
sponsored by Infrascale
WHITE PAPER:
This resource explains why cloud data archive is a more secure and reliable backup option over legacy tape solutions for MSPs.
Posted: 14 May 2014 | Published: 14 May 2014
|
|