Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • eBooks // Mar 2015

    Why threat intelligence is critical for next generation firewalls

    Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.

    Sponsored By Dell

  • White Papers // Mar 2015

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Discover why employing the right intrusion protection solution (IPS) is the critical first - and most important - step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

    Sponsored By Dell

  • White Papers // Mar 2015

    Controlling and Managing Superuser Access

    Explore this white paper to learn about the risks associated with privileged accounts, and how to mitigate those threats by enabling granular access control and accountability – while preserving necessary access and ease of use.

    Sponsored By Dell Software

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Sponsored By Dell and Intel

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint, Inc.

  • White Papers // May 2015

    Dealing with Data Breaches and Data Loss Prevention

    As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the...

    Sponsored By Proofpoint, Inc.

  • White Papers // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Most companies know that allowing employees to use personal devices improves productivity and job satisfaction. It can also reduce costs and allow for building virtual teams through geographically dispersed talent. But how can you make sure these devices don’t introduce new threats, impact compliance or monopolize bandwidth? Read the White...

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    There is good reason for IT to get involved in and maintain “bring your own device” (BYOD) procedures. These devices bring more than employee convenience — they promote agility and efficiency throughout your business. However, it’s on IT’s shoulders to form a pragmatic strategy to secure data from malware, theft...

    Sponsored By Dell Software

  • White Papers // Feb 2015

    Don't Supersize. Optimize. Is your printing solution too big?

    With all the new and exciting digital technologies on the market, it can be easy for IT departments to forget about more established elements of their infrastructure, such as printers, multifunction printers (MFPs), and document management systems. Nevertheless, it is important that they continually evaluate all aspects of their IT...

    Sponsored By Brother

  • White Papers // Jul 2015

    Fighting today’s Advanced Attacks

    Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a...

    Sponsored By FORTINET

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for SIEM

    The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases.

    Sponsored By IBM

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Aug 2014

    5 Strategies for Modern Data Protection

    Data growth, data center consolidation, server virtualization, and cloud services are wreaking havoc with conventional approaches to backup and recovery. This concise white paper presents five strategies for data protection – from deduplication to automation to granular recovery – that will not only help solve your current data management challenges...

    Sponsored By CommVault Systems

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value with Service Catalogue

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Sponsored By Webroot Software

  • White Papers // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // May 2015

    Quantifying Business Advantage - The Value of Database Selection

    Relational databases can frustrate you as well, holding back your best ideas. But now there is a better way. After trying for two years to build a single view of their customer on a relational database, one of the world’s leading insurance companies migrated to MongoDB and delivered the...

    Sponsored By MongoDB

  • White Papers // Apr 2015

    Webroot SecureAnywhere Business Mobile Protection

    In a recent survey, employers indicated that 95% of their employees are using mobile devices for work, with 61% of the employees using their own personal devices.1 Quick and easy ways to conduct business on the go are gaining momentum; so is the need for effective security for mobile devices...

    Sponsored By Webroot Software

  • White Papers // Apr 2015

    Business Endpoint Protection

    Like laptops, mobile devices are susceptible to digital attacks. More and more users rely on smartphones and tablets to manage their personal and business data, opening up an attractive new target for cybercriminals. Like laptops, mobile devices are susceptible to digital attacks. More and more users rely on smartphones and...

    Sponsored By Webroot Software

  • White Papers // Apr 2015

    Five Stages of a Web Malware Attack

    Today’s web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This whitepaper shows you how modern web attacks work, broken down into five stages, from entry through execution.

    Sponsored By Sophos

  • White Papers // Apr 2015

    Enterprise Mobility Management Buyers Guide

    This EMM buyers guide will walk you through the process of selecting the right mobile solution to fit your company’s BYOD objectives. It explains how an effective EMM system can support an organisation's workforce mobility strategy, ensure compliance, protect corporate data and provide centralised management of devices and apps while...

    Sponsored By Sophos

  • White Papers // Mar 2015

    Endpoint Buyers Guide

    Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

    Sponsored By Sophos

  • White Papers // Apr 2015

    The Forrester Wave Report: Endpoint Encryption 2015

    In Forrester’s 52-criteria evaluation of endpoint encryption vendors, they identified the seven most significant providers in the category and researched, analysed, and scored them. This report details the findings about how well each vendor fulfills the criteria and where they stand in relation to each other, to help security...

    Sponsored By Sophos

  • White Papers // Mar 2015

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Apr 2015

    Who’s Snooping on Your Email?

    This whitepaper helps you navigate today’s threats to email security. It explains the obstacles to compliance and shows you why you need a secure email gateway that offers more than just encryption.

    Sponsored By Sophos

  • White Papers // May 2015

    Webroot 2015 Threat Brief

    Did you know that: • 85,000 malicious IPs are launched every day? • Less than 55% of all URLs are Trustworthy? • 30% of Internet Users access Phishing sites? • 15% of New files are malicious executables? • Only 28% of mobile apps are trustworthy? The Webroot 2015 Threat Brief,...

    Sponsored By Webroot

  • White Papers // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

    Sponsored By Webroot

  • White Papers // May 2015

    The 12 Leading Players in the Corporate Web Security - Market Quadrant

    Webroot has again been identified as a “Trail Blazer” in the Corporate Web Security Market Quadrant 2014 report by The Radicati Group. The independent analysis recognizes Webroot SecureAnywhere® Web Security Service for its cloud-based threat detection, predictive threat intelligence and robust content filtering. The report includes in-depth, expert analysis of...

    Sponsored By Webroot

  • Webcasts // Mar 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • White Papers // May 2015

    Step-by-Step Configuration Guide

    Security is a major concern for IT professionals when think about the implementation of cloud computing solutions. In overcoming those concerns and enabling the hosting of all workloads, including those that depend on sensitive information, robust security mechanisms play a vital role. Intel and Red Hat come together to provide...

    Sponsored By Intel & Red Hat

  • White Papers // Mar 2015

    State of Public Cloud Security

    The majority of organisations using the cloud today don’t understand their shared security responsibilities, according to a recent survey by Forrester Consulting. This finding is alarming, especially with the constant revelations of major data breaches. Whether you’re just starting your cloud journey and want to know how others are approaching...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    Cloud Security Best practices

    In this whitepaper Best Practices for Public Cloud Security, Forrester shares cloud security survey results and best practices for addressing shared security responsibility. Forrester advocates a three-part model to secure data and applications in the cloud and specifically discusses how to achieve each recommendation: Verify and secure all resources Limit...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    The Expectation of SSL Everywhere

    SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. The stakes around SSL have been upleveled to the limit. Whether or not it’s convenient to admit, it’s time for organizations to uplevel...

    Sponsored By F5

  • White Papers // Mar 2015

    M-Trends 2015 - A View from the Front Lines

    While we have seen modest gains in organizations’ ability to overcome the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. The M-ternds report by Mandiant, provides a brief overview of the how attackers’ motives and tactics changed in 2014....

    Sponsored By FireEye

  • White Papers // Nov 2014

    The SIEM Who Cried Wolf: Focusing Your Cybersecurity Efforts on the Alerts that Matter

    Users cannot keep up. They cannot tell which alerts are important. Urgent warnings get lost in the noise. When valid warnings do appear, security teams don’t know what to do with them. For truly effective protection, security leaders must focus on the ability to detect true threats, quality of alerts...

    Sponsored By FireEye