Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Best Practice Security in a Cloud-Enabled World - IBM

    White Papers // Jan 2016 // provided by IBM

    This paper presents a straightforward approach to cloud security. The structural foundation of this approach will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all your environments—public and private clouds as well as bare ...

    Download Now
  • Smarter Contact Centers Using In-Memory Data Grids

    White Papers // Jan 2016 // provided by Red Hat

    The communications industry covers a wide spectrum of services, from wired and wireless voice communications and data access to video and content delivery. The industry is experiencing a period of significant change; new technologies are evolving, giving rise to new business models and challenges, customer demands are increasing, and competition ...

    Download Now
  • The Chief Digital Officer’s Guide to Digital Transformation

    White Papers // Jan 2016 // provided by CA Technologies

    This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Read more...

    Download Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    View this now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    View this now
  • Dell Data Protection:Quality Plus Fast ROI

    White Papers // Jan 2016 // provided by Dell

    Dell data protection solutions are the gold standard in the industry, delivering the backup, recovery, replication and disaster recovery required today by any organization, large or small. Dell data protection solutions also deliver a sound return on investment — dramatically reducing storage costs, freeing IT staff for more strategic projects ...

    Download Now
  • Dell: Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    White Papers // Jan 2016 // provided by Dell

    There is misalignment between what the business expects and what IT can actually deliver — especially when it comes to disaster recovery. Following these nine steps can help you organize your thoughts, ask the right questions and develop the right strategy to begin taking a more business-centric approach to disaster ...

    Download Now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now
  • Enemies in Our Midst: The Benefits of Compromise Assessments

    White Papers // Jan 2016 // provided by FireEye

    It’s not a question of if your organization will be breached. It’s a question of when. Most attackers remain active in environments for a significant amount of time before being discovered. And only a small percentage of organizations discover the presence of advanced attackers themselves—most need to be informed by ...

    Find out more
  • How can you secure your business network from an invisible threat?

    White Papers // Jan 2016 // provided by Singtel

    With more businesses having an online presence, the threat of cyber attacks has taken on a more serious note in Singapore. Having your network checked for vulnerabilities is an often overlooked step in network maintenance. Think of it as a regular health check-up. Detecting an irregularity early can save you ...

    Find out more

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?