Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • White Papers // Apr 2015

    Stop the hackers: 5 ways to protect your digital assets

    2014 was the Year of the Data Breach. Nearly 1 million new malware threats were released daily , and 43 percent of companies faced a data breach. In the webisode, Security and Protection for Digital Media Assets, Digital Asset Management (DAM) experts take a deeper look at recent security breaches,...

    Sponsored By Open Text

  • White Papers // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

    Sponsored By Proofpoint, Inc.

  • eBooks // Mar 2015

    How traditional firewalls fail today's networks - and why next-generation firewalls will prevail

    Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.

    Sponsored By Dell

  • White Papers // May 2015

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Sponsored By Proofpoint, Inc.

  • White Papers // Dec 2014

    2014 Global Report on the Cost of Cyber Crime

    The incidence and cost of cyber crime is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Global Report on the Cost of Cyber Crime is...

    Sponsored By HP

  • White Papers // Apr 2015

    Ensure a More Secure Future

    IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper concludes the series by looking at securing the greater future.

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Mar 2015

    Achieve deeper network security and application control

    Discover a next-generation firewall solution that combats emerging threats effectively and without compromise while reducing the total cost of ownership (TCO). Read this paper and learn how NGFWs a deeper level of security and safeguard your organization against today’s evolving threats.

    Sponsored By Dell

  • White Papers // Mar 2015

    NSS Labs: Next Generation Firewall Product Analysis

    Discover a next-generation firewall solution that increases security while reducing complexity. Read the NSS Labs report and learn why our NGFW solution was rated as one of the top products for security effectiveness, performance and scalability, three years in a row.

    Sponsored By Dell

  • White Papers // Apr 2015

    The ABC’s of Mobile Device Management

    Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

    Sponsored By IBM

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Protecting Your APIs against Attack and Hijack

    The pressure is on to securely connect the enterprise to mobile apps, cloud platforms and developer networks through APIs. But it is a mistake to think you can secure APIs using the same methods and technology as before. APIs have an entirely unique risk profile that must be addressed....

    Sponsored By CA Technologies

  • White Papers // Mar 2015

    Life Hacker: Making Mobility Real-eBook

    Let Life Hacker take you through the questions most frequently asked when talking about mobility in organisations around the world. This eBook, chapter by chapter, will examine: • Why Mobility Policy are now a must have • How to remain secure in this world of BYOD • What Mobile...

    Sponsored By Dell and Intel®

  • White Papers // Apr 2015

    Surfacing Critical Cyber Threats through Security Intelligence

    Cyber-attacks are occurring on an industrial scale. Information theft and the intentional disruption of digital and online processes are among the leading business risks that organizations face today. As many breaches go for months before they are detected, the fate of an organisation whose defenses have been compromised will be...

    Sponsored By LogRhythm

  • White Papers // May 2015

    Defending Against Advanced Threats - Addressing the Cyber Kill Chain

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how...

    Sponsored By Proofpoint, Inc.

  • White Papers // Jul 2015

    The Cisco 2015 Midyear Security Report

    As adversaries rapidly refine their ability to develop and deploy malware that can breach network defences and evade detection, the security industry, as a whole, struggles to innovate at a similar pace. This dynamic creates a significant problem for organizations investing in security products and services: They often end up...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    EU General Data Protection Regulation (Dutch)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec Identity: Access Manager - Bridging The Gap Between IT & Business

    Single Sign-On with strong authentication, access control, and user management for cloud-based apps. Learn More..

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • White Papers // Aug 2014

    Infographic: The Power of The Cloud

    Large enterprises today require greater flexibility and increased innovation from their IT function to compete on a global scale - yet technology consumption is changing and IT budgets are anything but growing. It’s time for a new approach. Review the infographic below to learn how and why European IT...

    Sponsored By Workday

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Guarding the castle

    Learn how to protect your network against emerging global threats with proactive countermeasures that are based upon input from millions of shared touch points, as well as ongoing analysis on the nature and changing behavior of today's threats.

    Sponsored By Dell

  • White Papers // Mar 2015

    A new set of network security challenges

    Discover how next-generation firewalls help IT address security and networking challenges without sacrificing productivity.

    Sponsored By Dell

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • eBooks // Mar 2015

    Why threat intelligence is critical for next generation firewalls

    Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.

    Sponsored By Dell

  • White Papers // Mar 2015

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Discover why employing the right intrusion protection solution (IPS) is the critical first - and most important - step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

    Sponsored By Dell

  • White Papers // May 2015

    Keep Cyber Threats From Destroying Your Organization

    As security threats grow and become more malicious, the opportunities for security breaches increase as well. Keeping up with the threats and methods of protecting sensitive data places a huge burden on IT departments. Learn how you can ease that burden for your IT department.

    Sponsored By LabTech Software

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Dec 2014

    Mobile Risk Report - Forbes list of Global 2000

    The Mobile Risk Report presents the major findings of HP Security Research’s comprehensive dive into today’s cyber vulnerability and mobile threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses. Download this report to know the report findings of more than...

    Sponsored By HP

  • White Papers // Dec 2014

    IT Security: Midsize Businesses Face Enterprise-Caliber Threats

    The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organisations often lack the sophisticated defenses of large enterprises, many fail to recognise their vulnerability and are overconfident in their ability...

    Sponsored By HP

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • White Papers // Apr 2015

    Security Essentials for CIO's: Responding to Inevitable Incident

    IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.

    Sponsored By IBM

  • White Papers // Aug 2014

    5 Strategies for Modern Data Protection

    Data growth, data center consolidation, server virtualization, and cloud services are wreaking havoc with conventional approaches to backup and recovery. This concise white paper presents five strategies for data protection – from deduplication to automation to granular recovery – that will not only help solve your current data management challenges...

    Sponsored By CommVault Systems

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // May 2015

    Dealing with Data Breaches and Data Loss Prevention

    As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the...

    Sponsored By Proofpoint, Inc.

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint, Inc.

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell