Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Rethinking the Network as a Security Sensor and Enforcer

    White Papers // Feb 2016 // provided by Cisco Systems

    Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. Read more and find out how through traffic visibility, ...

    Download Now
  • Australia: Adopting Stronger Cybersecurity Processes

    White Papers // Feb 2016 // provided by Cisco Systems

    Australia: Adopting Stronger Cybersecurity Processes Australia is considered a “fast follower” in its adoption of technology innovations. However, when it comes to cybersecurity, the country lags in sophistication. Specifically, the security culture within its organisations is not as developed as it is in other countries, and it has not adopted ...

    Download Now
  • SIEM Intel IT’s Security Business Intelligence Architecture

    Videos // Feb 2016 // provided by Intel Security

    Gain Insight on SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

    Watch Now
  • Securosis - Applied Threat Intelligence

    White Papers // Feb 2016 // provided by Intel Security

    Security practitioners have basically failed to keep pace with adversaries for the past decade. It is a sad story but true. So threat intelligence (TI) has garnered considerable interest as a counter to adversaries launching new attacks using new techniques, and an alternative to the broken negative security model. Looking ...

    Download Now
  • Predictive Analytics: The Future Is Now

    White Papers // Feb 2016 // provided by Intel Security

    Big data, computer models, and sophisticated algorithms have brought us much closer to accurately predicting things such as actuarial tables, inventory levels, and financial behavior. These tools help with pricing, manufacturing, and application approvals. Advanced analytics can also help security analysts understand the probable path of an attack and enable ...

    Download Now
  • Proactive Defense: Shifting to a Cyber Hunt Strategy

    White Papers // Feb 2016 // provided by Intel Security

    Find out how Big Data and hidden threats are forcing a change in enterprise security strategy. There also is a need to rethink what it means to "protect" the environment. McAfee Chief Security Officer Brent Conran talked with us about how enterprise security teams need to shift to a proactive ...

    Download Now
  • E.P.I.C. Application Performance Management (French)

    White Papers // Feb 2016 // provided by CA Technologies

    Once considered nice-to-haves, applications are now one of the primary interfaces connecting companies to their customers. The feel, functionality and performance of your applications have a direct effect on your business and your brand. The user experience is the currency of the application economy. You need to inspire your customers ...

    Download Now
  • E.P.I.C. Application Performance Management (Italian)

    White Papers // Feb 2016 // provided by CA Technologies

    Once considered nice-to-haves, applications are now one of the primary interfaces connecting companies to their customers. The feel, functionality and performance of your applications have a direct effect on your business and your brand. The user experience is the currency of the application economy. You need to inspire your customers ...

    Download Now
  • CA - Redefining Infrastructure Management for Today’s Application Economy

    White Papers // Feb 2016 // provided by CA Technologies

    In the application economy, innovation can’t happen fast enough. However, without an optimized data centre running behind them, winning applications won’t get to market in time and they won’t deliver the service levels required when they’re released. By establishing unified visibility into applications, IT and data centre infrastructure and capacity, ...

    Download Now
  • Jacques Vert Group embraces Symantec

    White Papers // Feb 2016 // provided by Symantec

    A leading fashion business with concessions in hundreds of outlets means disparate technology that is difficult to manage. British fashion group Jacques Vert adopted Symantec’s Endpoint Protection SBE to get a handle on their endpoint protection as part of their move to Office 365.

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?