Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Case Study - Symantec Granite Labs: IT as a Catalyst for Change

    White Papers // Jan 2016 // provided by NetApp

    Symantec maintains the largest civilian security threat analysis database in the world and traditionally runs hundreds of lab environments dedicated to customer support, product development, and education services, hosted at 25 locations around the world. Learn how they built one of the world's largest virtual private clouds to improve their ...

    Learn more
  • Download a FREE trial of Network Performance Monitor from SolarWinds

    Downloads // Jan 2016 // provided by Solarwinds APAC

    Download a trial of Network Performance Monitor from SolarWinds This is a tool specially designed for IT professionals like you! Fix spotty wireless coverage and improve connectivity with the wireless heat maps in SolarWinds® Network Performance Monitor (NPM). Display wireless coverage and signal strength using automated polling ...

    Download Now
  • Solution Guide: Secure Access Architecture

    White Papers // Jan 2016 // provided by FORTINET

    With the number and types of wireless devices connecting to the network continuing to grow exponentially with the propagation of Bring Your Own Device (BYOD) and emergence of IoT (Internet of Things), we cannot help but to acknowledge that network security is becoming now more important than ever. Organisation ...

    Download Now
  • Wireless Security Survey 2015

    White Papers // Jan 2016 // provided by FORTINET

    This global survey studies the state of the market for WLAN Security deployed among 1,490 medium-to-large Enterprises across a broad range of industries, and shows that the majority of enterprises have critical gaps in their WLAN Security strategy.

    Read more
  • When Minutes Count

    White Papers // Dec 2015 // provided by Intel Security

    The steady parade of attacks disclosed in 2014 has made it abundantly clear that current security efforts and checkbox compliance aren’t sufficient for data protection. In a new survey commissioned by McAfee, part of Intel Security, 74% of respondents remain highly concerned about their ability to handle targeted attacks and ...

    Download Now
  • Choosing the Right API Management Solution for the Enterprise User

    White Papers // Dec 2015 // provided by CA Technologies

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Read more
  • Tackling Attack Detection and Incident Response

    White Papers // Dec 2015 // provided by Intel Security

    The Enterprise Strategy Group (ESG) recently worked with Intel Security to analyze the results of a research project based upon a survey of 700 IT and security professionals at mid-market (i.e., 500 to 999 employees) and enterprise (i.e., more than 1,000 employees) organizations located in Asia, North America, EMEA and ...

    Download Now
  • A How-to Guide to OAuth & API Security

    White Papers // Dec 2015 // provided by CA Technologies

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Read more
  • 5 Pillars of API Management

    White Papers // Dec 2015 // provided by CA Technologies

    Understand the what, why and how of the five key areas that supports an enterprise API Management strategy.

    Read more
  • Building Resilience in a Digital Enterprise

    White Papers // Dec 2015 // provided by Intel Security

    To be successful in business today, an enterprise must operate securely in the cyberdomain. We’re in a period of unprecedented change where transformation and disruptive technologies are the new constant. This transformation and disruption are having a profound effect on security perception and architecture within the business. Security is recognized ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?