Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Dell Fireside Chat Part 2: Immobility the biggest threat to productivity

    Videos // Jan 2016 // provided by Dell

    As employees become dispersed and less likely to be found sitting at a desk, between 9 to 5:30, the ability to work remotely is becoming the better go to strategy for organisations. However employees are turning to BYO devices and rather than implementing an effective mobile strategy, some organisations are ...

    Watch Now
  • Dell Fireside Chat Part 3: Get on board the mobility train

    Videos // Jan 2016 // provided by Dell

    Shaping a mobile strategy to future-ready the workforce is key to becoming an agile organisation. However the IT department can't be alone in shaping and enforcing a mobile strategy. Organisations need to look within themselves and each department to get input on creating a comprehensive strategy that will take ...

    Watch Now
  • Smarter Contact Centers Using In-Memory Data Grids

    White Papers // Jan 2016 // provided by Red Hat

    The communications industry covers a wide spectrum of services, from wired and wireless voice communications and data access to video and content delivery. The industry is experiencing a period of significant change; new technologies are evolving, giving rise to new business models and challenges, customer demands are increasing, and competition ...

    Download Now
  • Secure Shadow IT with aPaaS

    Webcasts // Jan 2016 // provided by Intuit

    With as much as 30% of total IT budgets being spent outside of IT departments1, technical workarounds by the business, also known as "shadow IT", can no longer be ignored. In order to strike a necessary balance between IT control and business-driven efforts, many IT leaders are turning to ...

    Watch Now
  • Best Practice Security in a Cloud-Enabled World - IBM

    White Papers // Jan 2016 // provided by IBM

    This paper presents a straightforward approach to cloud security. The structural foundation of this approach will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all your environments—public and private clouds as well as bare ...

    Download Now
  • Why Application Security Must Be Your Number 1 Priority.

    White Papers // Jan 2016 // provided by SingTel

    Organisations of all sizes are struggling to secure their corporate data assets from being engulfed by a tidal wave of application security threats. The ‘apps explosion’, precipitated by the introduction of smartphones and tablets computers, is challenging the vigilance of most IT security departments. Simply put, if the most vulnerable ...

    Download Now
  • The Chief Digital Officer’s Guide to Digital Transformation

    White Papers // Jan 2016 // provided by CA Technologies

    This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Read more...

    Download Now
  • Dell Data Protection:Quality Plus Fast ROI

    White Papers // Jan 2016 // provided by Dell

    Dell data protection solutions are the gold standard in the industry, delivering the backup, recovery, replication and disaster recovery required today by any organization, large or small. Dell data protection solutions also deliver a sound return on investment — dramatically reducing storage costs, freeing IT staff for more strategic projects ...

    Download Now
  • Dell: Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    White Papers // Jan 2016 // provided by Dell

    There is misalignment between what the business expects and what IT can actually deliver — especially when it comes to disaster recovery. Following these nine steps can help you organize your thoughts, ask the right questions and develop the right strategy to begin taking a more business-centric approach to disaster ...

    Download Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?