Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • White Papers // Apr 2015

    Stop the hackers: 5 ways to protect your digital assets

    2014 was the Year of the Data Breach. Nearly 1 million new malware threats were released daily , and 43 percent of companies faced a data breach. In the webisode, Security and Protection for Digital Media Assets, Digital Asset Management (DAM) experts take a deeper look at recent security breaches,...

    Sponsored By Open Text

  • White Papers // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

    Sponsored By Proofpoint, Inc.

  • White Papers // May 2015

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Sponsored By Proofpoint, Inc.

  • White Papers // Dec 2014

    2014 Global Report on the Cost of Cyber Crime

    The incidence and cost of cyber crime is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Global Report on the Cost of Cyber Crime is...

    Sponsored By HP

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Apr 2015

    Ensure a More Secure Future

    IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper concludes the series by looking at securing the greater future.

    Sponsored By IBM

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Protecting Your APIs against Attack and Hijack

    The pressure is on to securely connect the enterprise to mobile apps, cloud platforms and developer networks through APIs. But it is a mistake to think you can secure APIs using the same methods and technology as before. APIs have an entirely unique risk profile that must be addressed....

    Sponsored By CA Technologies

  • White Papers // Apr 2015

    The ABC’s of Mobile Device Management

    Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

    Sponsored By IBM

  • White Papers // Apr 2015

    Surfacing Critical Cyber Threats through Security Intelligence

    Cyber-attacks are occurring on an industrial scale. Information theft and the intentional disruption of digital and online processes are among the leading business risks that organizations face today. As many breaches go for months before they are detected, the fate of an organisation whose defenses have been compromised will be...

    Sponsored By LogRhythm

  • White Papers // Mar 2015

    Life Hacker: Making Mobility Real-eBook

    Let Life Hacker take you through the questions most frequently asked when talking about mobility in organisations around the world. This eBook, chapter by chapter, will examine: • Why Mobility Policy are now a must have • How to remain secure in this world of BYOD • What Mobile...

    Sponsored By Dell and Intel®

  • White Papers // May 2015

    Defending Against Advanced Threats - Addressing the Cyber Kill Chain

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how...

    Sponsored By Proofpoint, Inc.

  • White Papers // Jul 2015

    EU General Data Protection Regulation (Dutch)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec Identity: Access Manager - Bridging The Gap Between IT & Business

    Single Sign-On with strong authentication, access control, and user management for cloud-based apps. Learn More..

    Sponsored By Symantec

  • White Papers // Aug 2015

    Dell: Why Managing Privileged Accounts Is a Prerequisite For PCI DSS Compliance (German)

    For many organizations, compliance with data security standards remains a problem. IT projects for security compliance are in constant competition with Projects to combat persistently acute threats to information security, operational vulnerabilities, and daily business risks. Read more...

    Sponsored By Dell Software

  • White Papers // Jul 2015

    The Cisco 2015 Midyear Security Report

    As adversaries rapidly refine their ability to develop and deploy malware that can breach network defences and evade detection, the security industry, as a whole, struggles to innovate at a similar pace. This dynamic creates a significant problem for organizations investing in security products and services: They often end up...

    Sponsored By Cisco Systems

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • White Papers // Aug 2014

    Infographic: The Power of The Cloud

    Large enterprises today require greater flexibility and increased innovation from their IT function to compete on a global scale - yet technology consumption is changing and IT budgets are anything but growing. It’s time for a new approach. Review the infographic below to learn how and why European IT...

    Sponsored By Workday

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • White Papers // Dec 2014

    Mobile Risk Report - Forbes list of Global 2000

    The Mobile Risk Report presents the major findings of HP Security Research’s comprehensive dive into today’s cyber vulnerability and mobile threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses. Download this report to know the report findings of more than...

    Sponsored By HP

  • White Papers // Dec 2014

    IT Security: Midsize Businesses Face Enterprise-Caliber Threats

    The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organisations often lack the sophisticated defenses of large enterprises, many fail to recognise their vulnerability and are overconfident in their ability...

    Sponsored By HP

  • White Papers // May 2015

    Keep Cyber Threats From Destroying Your Organization

    As security threats grow and become more malicious, the opportunities for security breaches increase as well. Keeping up with the threats and methods of protecting sensitive data places a huge burden on IT departments. Learn how you can ease that burden for your IT department.

    Sponsored By LabTech Software

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Aug 2014

    5 Strategies for Modern Data Protection

    Data growth, data center consolidation, server virtualization, and cloud services are wreaking havoc with conventional approaches to backup and recovery. This concise white paper presents five strategies for data protection – from deduplication to automation to granular recovery – that will not only help solve your current data management challenges...

    Sponsored By CommVault Systems

  • White Papers // Apr 2015

    Security Essentials for CIO's: Responding to Inevitable Incident

    IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.

    Sponsored By IBM

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell

  • White Papers // May 2015

    Dealing with Data Breaches and Data Loss Prevention

    As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the...

    Sponsored By Proofpoint, Inc.

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint, Inc.

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution. Read More..

    Sponsored By Symantec

  • White Papers // Aug 2015

    Beginner's Guide to SSL Certificates (French)

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution. Read More..

    Sponsored By Symantec

  • White Papers // Feb 2015

    Don't Supersize. Optimize. Is your printing solution too big?

    With all the new and exciting digital technologies on the market, it can be easy for IT departments to forget about more established elements of their infrastructure, such as printers, multifunction printers (MFPs), and document management systems. Nevertheless, it is important that they continually evaluate all aspects of their IT...

    Sponsored By Brother

  • White Papers // Jul 2015

    Fighting today’s Advanced Attacks

    Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a...

    Sponsored By FORTINET

  • White Papers // Aug 2015

    Solution Guide - Advanced Protection Beyond the Firewall

    The changing landscape of network security shows threat trends that evades firewall and IPS protections. Advanced Next Generation Firewalls (NGFWs) and IPSs with expanded features such as antivirus, antimalware, application control and deep packet inspection can provide protections from known threats. However, they cannot completely protect against zero day attacks,...

    Sponsored By FORTINET

  • White Papers // Aug 2014

    5 Strategies for Modern Data Protection

    Data growth, data center consolidation, server virtualization, and cloud services are wreaking havoc with conventional approaches to backup and recovery. This concise white paper presents five strategies for data protection - from deduplication to automation to granular recovery - that will not only help solve your current data management challenges...

    Sponsored By CommVault