Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Research // Aug 2014

    Infographic: Understanding the real value of Big Data

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for all sorts of organizations. See this infographic read to discover why big data matters to you and your organization.

    Sponsored By Workday

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Oct 2013

    IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see...

    Provided By ZDNet

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Sep 2013

    Software License Audit: Breeze it and Beat it with Dell KACE!

    For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...

    Provided By Dell Kace

  • Research // Aug 2013

    Future of Sales Performance Whitepaper (Nucleus)

    Learn how the future of sales performance management is integrated with CRM and social collaboration and how this will help managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results. Download now!

    Provided By Salesforce.com

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By OpenText

  • Research // Feb 2013

    IBM X-Force 2012 Mid Year Trend and Risk Report

    The IBM X-Force 2012 Mid Year Trend and Risk provides a detailed analysis and summary of the latest internet threats including vulnerability disclosures, exploits and active attacks, viruses and other malware, spam, phishing, malicious web content and risk stemming from emerging trends including "bring your own" mobile device challenges and...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Forrester TAP-Analyst report: Cloud-Based Disaster Recovery Barriers And Drivers In The Enterprise A Custom Technology Adoption Profile Commissioned By IBM (Research Report)

    The necessity of building a disaster recovery model to ensure that services can be delivered nonstop with minimal data loss is not easy or inexpensive. Read this research report to learn how the cloud offers companies an alternative, allowing for rapid recovery and minimal data loss, and without the high...

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Jan 2013

    Avoid vulnerabilities and threats in the cloud - What your organization needs to know about security in the cloud

    Like any other technology, there are vulnerabilities that attackers look for in the cloud; however, users can make the cloud a safer place by becoming aware of these security challenges and how to address them. Read this article to learn more about the environment in which your organization is working,...

    Provided By IBM

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Nov 2012

    Emerging threats: How to protect your business

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take...

    Provided By ZDNet

  • Research // Oct 2012

    ESG Research Report: New NetVault Backup Licensing Model

    Why are traditional backup licensing models outdated - and costly - in today's data-protection environment? In this Enterprise Strategy Group product brief, learn about the specific changes in the data protection industry, and how these shifts have affected changes in backup licensing models. Then, discover the drivers that are shaping...

    Provided By Dell Software

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Jun 2012

    Insider threats: Defending against costly breaches

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much...

    Provided By ZDNet

  • Research // May 2012

    How IT is ganging up on organised cybercrime

    Lone criminals no longer dominate digital crime. According to research from Detica, 80 percent of internet crime is perpetrated by co-ordinated groups. Cybercriminals are working together to wreak havoc on businesses and governments, and the public and private sectors are both facing a full spectrum of threats, from financial crime...

    Provided By ZDNet

  • Research // May 2012

    Internet Security Threat Report 2012

    Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, a system of more than 5 million decoy accounts and more. Over 8 billion email messages and more than 1.4 billion web requests are processed each day across 15 data centres. Symantec also...

    Provided By Symantec (formerly VeriSign)

  • Research // Mar 2012

    IT Priorities Special Report: Security. Emerging Technologies, and the

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Research // Dec 2011

    Hacktivism: Threats and reality for IT managers

    In 2011, the Anonymous and LulzSec collectives made front-page news. Similarly, data breaches from lost laptops and malware seemed to pop up on a weekly basis. But using DDoS attacks and other hacks as a form of protest - or 'hacktivism' - isn't a new phenomenon, and neither is lost...

    Provided By ZDNet

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Aug 2014

    Infographic: Understanding the real value of Big Data

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for all sorts of organizations. See this infographic read to discover why big data matters to you and your organization.

    Sponsored By Workday

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Feb 2013

    IBM X-Force 2012 Mid Year Trend and Risk Report

    The IBM X-Force 2012 Mid Year Trend and Risk provides a detailed analysis and summary of the latest internet threats including vulnerability disclosures, exploits and active attacks, viruses and other malware, spam, phishing, malicious web content and risk stemming from emerging trends including "bring your own" mobile device challenges and...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Forrester TAP-Analyst report: Cloud-Based Disaster Recovery Barriers And Drivers In The Enterprise A Custom Technology Adoption Profile Commissioned By IBM (Research Report)

    The necessity of building a disaster recovery model to ensure that services can be delivered nonstop with minimal data loss is not easy or inexpensive. Read this research report to learn how the cloud offers companies an alternative, allowing for rapid recovery and minimal data loss, and without the high...

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Jan 2013

    Avoid vulnerabilities and threats in the cloud - What your organization needs to know about security in the cloud

    Like any other technology, there are vulnerabilities that attackers look for in the cloud; however, users can make the cloud a safer place by becoming aware of these security challenges and how to address them. Read this article to learn more about the environment in which your organization is working,...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // Oct 2012

    ESG Research Report: New NetVault Backup Licensing Model

    Why are traditional backup licensing models outdated - and costly - in today's data-protection environment? In this Enterprise Strategy Group product brief, learn about the specific changes in the data protection industry, and how these shifts have affected changes in backup licensing models. Then, discover the drivers that are shaping...

    Provided By Dell Software

  • Research // Aug 2013

    Future of Sales Performance Whitepaper (Nucleus)

    Learn how the future of sales performance management is integrated with CRM and social collaboration and how this will help managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results. Download now!

    Provided By Salesforce.com

  • Research // Sep 2013

    Software License Audit: Breeze it and Beat it with Dell KACE!

    For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...

    Provided By Dell Kace

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By OpenText

  • Research // May 2012

    Internet Security Threat Report 2012

    Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, a system of more than 5 million decoy accounts and more. Over 8 billion email messages and more than 1.4 billion web requests are processed each day across 15 data centres. Symantec also...

    Provided By Symantec (formerly VeriSign)

  • Research // Mar 2012

    IT Priorities Special Report: Security. Emerging Technologies, and the

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By ZDNet

  • Research // Jun 2012

    Insider threats: Defending against costly breaches

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much...

    Provided By ZDNet

  • Research // Dec 2011

    Hacktivism: Threats and reality for IT managers

    In 2011, the Anonymous and LulzSec collectives made front-page news. Similarly, data breaches from lost laptops and malware seemed to pop up on a weekly basis. But using DDoS attacks and other hacks as a form of protest - or 'hacktivism' - isn't a new phenomenon, and neither is lost...

    Provided By ZDNet

  • Research // Oct 2013

    IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see...

    Provided By ZDNet

  • Research // Nov 2012

    Emerging threats: How to protect your business

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take...

    Provided By ZDNet

  • Research // May 2012

    How IT is ganging up on organised cybercrime

    Lone criminals no longer dominate digital crime. According to research from Detica, 80 percent of internet crime is perpetrated by co-ordinated groups. Cybercriminals are working together to wreak havoc on businesses and governments, and the public and private sectors are both facing a full spectrum of threats, from financial crime...

    Provided By ZDNet

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet