Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Dell Fireside Chat Part 2: Immobility The Biggest Threat To Productivity

    Videos // Jan 2016 // provided by Dell and Windows 10

    As employees become dispersed and less likely to be found sitting at a desk, between 9 to 5:30, the ability to work remotely is becoming the better go to strategy for organisations. However employees are turning to BYO devices and rather than implementing an effective mobile strategy, some organisations are ...

    Watch Now
  • Dell Fireside Chat Part 3: Get On Board The Mobility Train

    Videos // Jan 2016 // provided by Dell and Windows 10

    Shaping a mobile strategy to future-ready the workforce is key to becoming an agile organisation. However the IT department can't be alone in shaping and enforcing a mobile strategy. Organisations need to look within themselves and each department to get input on creating a comprehensive strategy that will take ...

    Watch Now
  • Smarter Contact Centers Using In-Memory Data Grids

    White Papers // Jan 2016 // provided by Red Hat

    The communications industry covers a wide spectrum of services, from wired and wireless voice communications and data access to video and content delivery. The industry is experiencing a period of significant change; new technologies are evolving, giving rise to new business models and challenges, customer demands are increasing, and competition ...

    Download Now
  • Best Practice Security in a Cloud-Enabled World - IBM

    White Papers // Jan 2016 // provided by IBM

    This paper presents a straightforward approach to cloud security. The structural foundation of this approach will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all your environments—public and private clouds as well as bare ...

    Download Now
  • The Chief Digital Officer’s Guide to Digital Transformation

    White Papers // Jan 2016 // provided by CA Technologies

    This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Read more...

    Download Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    View this now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    View this now
  • Dell Data Protection:Quality Plus Fast ROI

    White Papers // Jan 2016 // provided by Dell

    Dell data protection solutions are the gold standard in the industry, delivering the backup, recovery, replication and disaster recovery required today by any organization, large or small. Dell data protection solutions also deliver a sound return on investment — dramatically reducing storage costs, freeing IT staff for more strategic projects ...

    Download Now
  • Dell: Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    White Papers // Jan 2016 // provided by Dell

    There is misalignment between what the business expects and what IT can actually deliver — especially when it comes to disaster recovery. Following these nine steps can help you organize your thoughts, ask the right questions and develop the right strategy to begin taking a more business-centric approach to disaster ...

    Download Now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?