Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // May 2015

    Quantifying Business Advantage - The Value of Database Selection

    Relational databases can frustrate you as well, holding back your best ideas. But now there is a better way. After trying for two years to build a single view of their customer on a relational database, one of the world’s leading insurance companies migrated to MongoDB and delivered the...

    Sponsored By MongoDB

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // May 2015

    Patch Management Best Practices for IT Professionals

    Patch management is one of the largest concerns of IT professionals. With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In addition, the lag time between when vulnerability is discovered and when a virus or worm appears is...

    Sponsored By LabTech Software

  • White Papers // May 2015

    Keep Cyber Threats From Destroying Your Organization

    As security threats grow and become more malicious, the opportunities for security breaches increase as well. Keeping up with the threats and methods of protecting sensitive data places a huge burden on IT departments. Learn how you can ease that burden for your IT department.

    Sponsored By LabTech Software

  • White Papers // May 2015

    Protecting Your Company From a Data Disaster

    Unexpected data loss can occur at any time. Whether due to natural disasters such as floods, hurricanes and tornadoes or to more common events such as water main breaks, building fires and hardware failures, the consequences of data loss can be extensive and far-reaching. As an IT professional, it's up...

    Sponsored By LabTech Software

  • eBooks // May 2015

    5. Cloud: security threat or opportunity?

    5 of 5 ebooks in the Steps to Cloud Expertise Series

    Sponsored By IBM

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • White Papers // May 2015

    4 Security Industry Analyst Recommendations on DDoS Protection

    Neustar found that many of the recommendations are currently found in SiteProtect DDoS protection services with future trends aligned to near term implementation. Following are 4 key take-aways with insights to the report’s DDoS protection recommendations.

    Sponsored By Neustar

  • White Papers // May 2015

    Think You are Safe from DDoS Attacks?

    Amazon Web Services is the world’s top cloud platform. That’s probably why you’re on it – to enjoy reliable, scalable and affordable cloud computing. But while AWS excels at many things, it’s mainly left to the developer to protect against a range of cyberattacks, including DDoS. In fact, AWS does...

    Sponsored By Neustar

  • White Papers // May 2015

    Step-by-Step Configuration Guide

    Security is a major concern for IT professionals when think about the implementation of cloud computing solutions. In overcoming those concerns and enabling the hosting of all workloads, including those that depend on sensitive information, robust security mechanisms play a vital role. Intel and Red Hat come together to provide...

    Sponsored By Intel & Red Hat

  • White Papers // May 2015

    Seven reasons why Microsoft Windows 8 is better with Intel Security

    Windows 8 is a complex operating system and sometimes exhibit critical vulnerabilities, which are promptly exploited by cyber-hackers. The fact that most Windows 7 applications will run natively on Windows 8 means that most malware will also run on Windows 8.So if you run, or are planning to deploy, Windows...

    Sponsored By Intel Security

  • White Papers // May 2015

    Protecting Against Mobile App SSL Vulnerabilities

    Have you thought about the many ways in which mobile apps may be exposing your company’s sensitive information to man-in-the-middle (MITM) attacks? Today, employees are easily enthralled by the excitement of new mobile apps, and rarely think about the risks that come along with these supposedly secure apps.This report, brought...

    Sponsored By Intel Security

  • White Papers // May 2015

    Webroot 2015 Threat Brief

    Did you know that: • 85,000 malicious IPs are launched every day? • Less than 55% of all URLs are Trustworthy? • 30% of Internet Users access Phishing sites? • 15% of New files are malicious executables? • Only 28% of mobile apps are trustworthy? The Webroot 2015 Threat Brief,...

    Sponsored By Webroot

  • White Papers // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

    Sponsored By Webroot

  • White Papers // May 2015

    The 12 Leading Players in the Corporate Web Security - Market Quadrant

    Webroot has again been identified as a “Trail Blazer” in the Corporate Web Security Market Quadrant 2014 report by The Radicati Group. The independent analysis recognizes Webroot SecureAnywhere® Web Security Service for its cloud-based threat detection, predictive threat intelligence and robust content filtering. The report includes in-depth, expert analysis of...

    Sponsored By Webroot

  • White Papers // May 2015

    Ten Sneaky Things a Spammer Will Do

    Spam will continue to plague Inboxes until it is no longer profitable for the spammer or there is a hack-proof method of prevention that is easy to use. Read this ebook and learn the techniques spammers employ to reach their target audience, and discover the solutions that can help protect...

    Sponsored By Dell Software

  • White Papers // May 2015

    Phishing: When Email is the Enemy

    Assuming your employees or spam filter can detect the difference between legitimate emails and phishing scams is not enough. Discover the challenges of staying ahead of phishing and learn a framework to incorporate anti-phishing actions into your existing security processes.

    Sponsored By Dell Software

  • White Papers // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

    Sponsored By Dell Software

  • White Papers // Apr 2015

    ESG Report: Network Encryption and its Impact on Enterprise Security

    Taken from a collaborative research survey of 150 IT and information security professionals, this report will evaluate the information security practices used to decrypt and inspect encrypted traffic and new technologies being adopted to protect organisation. Based upon the data collected, this paper concludes: Network encryption is ubiquitous and...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    ETM Comparison Matrix

    This Matrix will provide a comparison between the Encryption Traffic Management Solutions available to organisations today. The Report will examine why Blues Coat and their ETM is leading the way in providing organisations with the tools to combat hidden risks in your SSL and HTTPS traffic, enforce your policies, and...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    Videocast Demo: SSL Visibility Appliances today

    Learn how to maximize the features and functions of this powerful Encrypted Traffic Management (ETM) solution by watching our demo video. It shows you configuration best practices and step-by-step instructions on how to: Use the dashboard to monitor status, health, and connectivity of the system Optimize your use...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    The Visibility Void

    Attacks through HTTPS can be a vulnerability for enterprises. To identify hidden threats to the business, enterprises need complete visibility into encrypted traffic. However, to comply with local privacy regulations and their own acceptable use policies, enterprises must have the means to selectively decrypt this traffic. An encrypted traffic management...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    Protecting Exchange: Best Practices and Practical Tips

    Protecting email data is critical for today's organizations, yet most disaster-recovery plans don’t incorporate a comprehensive email data-protection strategy. Find out the best ways to safeguard precious email data in your Microsoft Exchange environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    How to Avoid the Coming Backup Crunch

    Data is exploding at a time when tolerances for loss are near zero. Learn about a proven solution that enables organizations to capture continuous backup snapshots, automate recoverability testing, and offload data deduplication/compression tasks using minimal infrastructure and human resources. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Disk Backup Appliances: The Next Generation

    Have you examined your backup strategy recently? You may be exposing your business to unnecessary risk and expense. Find out how you can save time on deployment, simplify day-to-day management, shrink your backup windows and significantly reduce your backup-storage footprint. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Dell Data Protection Point of View

    Your backup methodology depends on data classification, recovery objectives and IT infrastructure. Learn how to enable the best data-protection methods for your environment — safeguarding your organization’s critical information and applications - without adding excessive costs or complexity. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Building Higher IT Business Continuity in the Face of Disaster

    Some disasters, such as hurricanes, are preceded by a warning. Most are not. Forces of nature, malicious acts, or even human error can have a detrimental impact on your business. Be prepared by learning some first steps and follow-ups to upgrade your disaster preparedness. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Be a C-suite hero with these 5 key virtual + physical data protection takeaways.

    Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Unified Backup: Virtual & Physical

    Protecting data is a holistic practice; so, you're only as strong as your weakest link. Find out how the latest release of Dell AppAssure unifies virtualized stand-alone backup, replication and recovery processes — without compromising data protection. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    The Buyers Guide to Virtual and Physical Data Protection

    New technologies now make data protection faster and more reliable both for physical and virtual machines. Let this guide help you sort through traditional and cutting-edge data-protection solutions to find the best option for your environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Superior VMware® Protection for Limited IT Budgets

    A complete VMware data-protection strategy should offer protection for mission-critical applications, along with automated nightly backup and replication for less critical data. Find out the four major criteria for implementing cost-effective data protection in your own VMware environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Stop the hackers: 5 ways to protect your digital assets

    2014 was the Year of the Data Breach. Nearly 1 million new malware threats were released daily , and 43 percent of companies faced a data breach. In the webisode, Security and Protection for Digital Media Assets, Digital Asset Management (DAM) experts take a deeper look at recent security breaches,...

    Sponsored By Open Text

  • White Papers // Apr 2015

    Sharpen Your Device, Data And Document Security Solution with HP JetAdvantage Security

    You know how valuable data is to your organization. But the more data you acquire and share, the more security risks and requirements you face. Your imaging and printing environment is not immune. Security gaps can leave sensitive data dangerously exposed. To counter the risks, organisations must integrate imaging and...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

    Sponsored By Symantec

  • eBooks // Apr 2015

    Internet Security Threat Report 2015 - eGuide

    This Annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant...

    Sponsored By Symantec

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Infographic Path of a Cyberattacker

    2014 has been a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years. This report looks from the attacker's perspective to understand the path of their attacks. Download this report to learn more.

    Sponsored By Symantec

  • eBooks // Apr 2015

    Internet Security Threat Report 2015

    The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Key Findings: •...

    Sponsored By Symantec

  • White Papers // Apr 2015

    IDC: Calculating the Business Value of Next Generation Firewalls

    Unprecedented demand for business growth is driving the introduction of new applications and a mobile workforce scattered across the globe. Security often becomes an afterthought, leaving organisations at an increased risk of attack. But how can you justify the investment in a new, more effective solution? Eight Intel Security...

    Sponsored By Intel Security

  • White Papers // Apr 2015

    NSS Labs: Can your current firewall block 96.6% of attacks against your server applications?

    Or can it block 94.6% of attacks against client applications? NSS Labs performed an independent test to the McAfee Next Generation Firewall, subjecting it to thorough testing of key operational features such as security effectiveness, performance, stability, reliability, total cost of ownership and many more. Download this eye-opening report and...

    Sponsored By Intel Security

  • White Papers // Apr 2015

    How can you ensure your network is protected without breaking the bank?

    Is your firewall holding your business back? High scalability and availability is no longer a good-to-have feature in todays world. To secure business-critical applications your next generation firewall must have native active clustering, multi-link, firewall/VPN specifications, IPS and not break your companys bank. Download this report to understand how McAfee...

    Sponsored By Intel Security

  • White Papers // Apr 2015

    Dell Data Protection Point of View

    Your backup methodology depends on data classification, recovery objectives and IT infrastructure. Learn how to enable the best data-protection methods for your environment — safeguarding your organization’s critical information and applications - without adding excessive costs or complexity. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Mar 2015

    A new set of network security challenges

    Discover how next-generation firewalls help IT address security and networking challenges without sacrificing productivity.

    Sponsored By Dell

  • White Papers // Apr 2015

    Be a C-suite hero with these 5 key virtual + physical data protection takeaways.

    Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.

    Sponsored By Dell Software

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • eBooks // Mar 2015

    Why threat intelligence is critical for next generation firewalls

    Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.

    Sponsored By Dell

  • White Papers // Mar 2015

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Discover why employing the right intrusion protection solution (IPS) is the critical first - and most important - step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

    Sponsored By Dell

  • White Papers // Mar 2015

    Controlling and Managing Superuser Access

    Explore this white paper to learn about the risks associated with privileged accounts, and how to mitigate those threats by enabling granular access control and accountability – while preserving necessary access and ease of use.

    Sponsored By Dell Software

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Sponsored By Dell and Intel

  • Downloads // Nov 2009

    TechRepublic's Geek Gift Guide 2009

    Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic once again brings together our unique perspective reviews of some of the best geek gifts on the market, all just...

    Sponsored By TechRepublic

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Five Simple Strategies for Securing APIs

    APIs might represent increased risk for the enterprise, but the potential benefits they bring to an organisation can overshadow any inherent dangers. Read this eBook to understand the 3 attack vectors or watch with APIs, and 5 simple strategies to secure your APIs.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Choosing the Right API Management Solution for the Enterprise User

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    A How-to Guide to OAuth & API Security

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Top 5 Reasons Why Cloud Security Beats Traditional Security

    Not long ago, security was viewed as one of the biggest obstacles to widespread adoption of cloud-based deployments for enterprise software solutions. With recent developments and cloud vendors living exclusively in the cloud world, they have managed to build a much higher level of data center and virtual system security...

    Sponsored By Infor

  • White Papers // Mar 2015

    State of Public Cloud Security

    The majority of organisations using the cloud today don’t understand their shared security responsibilities, according to a recent survey by Forrester Consulting. This finding is alarming, especially with the constant revelations of major data breaches. Whether you’re just starting your cloud journey and want to know how others are approaching...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    Cloud Security Best practices

    In this whitepaper Best Practices for Public Cloud Security, Forrester shares cloud security survey results and best practices for addressing shared security responsibility. Forrester advocates a three-part model to secure data and applications in the cloud and specifically discusses how to achieve each recommendation: Verify and secure all resources Limit...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    The Expectation of SSL Everywhere

    SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. The stakes around SSL have been upleveled to the limit. Whether or not it’s convenient to admit, it’s time for organizations to uplevel...

    Sponsored By F5

  • White Papers // Mar 2015

    M-Trends 2015 - A View from the Front Lines

    While we have seen modest gains in organizations’ ability to overcome the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. The M-ternds report by Mandiant, provides a brief overview of the how attackers’ motives and tactics changed in 2014....

    Sponsored By FireEye

  • White Papers // May 2015

    Quantifying Business Advantage - The Value of Database Selection

    Relational databases can frustrate you as well, holding back your best ideas. But now there is a better way. After trying for two years to build a single view of their customer on a relational database, one of the world’s leading insurance companies migrated to MongoDB and delivered the...

    Sponsored By MongoDB

  • White Papers // Apr 2015

    Webroot SecureAnywhere Business Mobile Protection

    In a recent survey, employers indicated that 95% of their employees are using mobile devices for work, with 61% of the employees using their own personal devices.1 Quick and easy ways to conduct business on the go are gaining momentum; so is the need for effective security for mobile devices...

    Sponsored By Webroot Software

  • White Papers // Apr 2015

    Business Endpoint Protection

    Like laptops, mobile devices are susceptible to digital attacks. More and more users rely on smartphones and tablets to manage their personal and business data, opening up an attractive new target for cybercriminals. Like laptops, mobile devices are susceptible to digital attacks. More and more users rely on smartphones and...

    Sponsored By Webroot Software

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Nov 2014

    The SIEM Who Cried Wolf: Focusing Your Cybersecurity Efforts on the Alerts that Matter

    Users cannot keep up. They cannot tell which alerts are important. Urgent warnings get lost in the noise. When valid warnings do appear, security teams don’t know what to do with them. For truly effective protection, security leaders must focus on the ability to detect true threats, quality of alerts...

    Sponsored By FireEye

  • White Papers // Nov 2014

    Cybersecurity’s Maginot Line: A real world assessment of the defense-in-depth model

    It doesn’t matter what types of firewall, intrusion prevention system (IPS), Web gateway, sandbox and endpoint systems make up organizations’ Maginot Line; attackers are circumventing them all. As this report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures...

    Sponsored By FireEye

  • White Papers // Dec 2014

    Does Application Security Pay?

    Measuring the Business Impact of Software Security Assurance Solutions With the escalating number and increasing sophistication of cyber attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don't open doors for hackers. Mainstay surveyed 12 organisations that implemented application vulnerability testing with HP Fortify. Their...

    Sponsored By HP

  • eBooks // Nov 2014

    Analyzing the Neverquest Malware Threat

    Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works...

    Sponsored By F5

  • White Papers // Nov 2014

    Operationalizing the Network with SDN

    The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources─combined with increased mobility of apps migrating to the cloud and...

    Sponsored By F5

  • White Papers // Nov 2014

    Achieving Security with Cloud Data Protection

    Today, more and more companies recognize the value and convenience of using cloud backup to protect their server data. HP Autonomy offers hosted data storage that enables you to reduce the costs, risks, and complexity of storing and protecting your business information. With a heightened focus on security, privacy, and...

    Sponsored By HP

  • White Papers // Mar 2015

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • White Papers // Mar 2015

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

    Sponsored By Sophos

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // May 2015

    Webroot 2015 Threat Brief

    Did you know that: • 85,000 malicious IPs are launched every day? • Less than 55% of all URLs are Trustworthy? • 30% of Internet Users access Phishing sites? • 15% of New files are malicious executables? • Only 28% of mobile apps are trustworthy? The Webroot 2015 Threat Brief,...

    Sponsored By Webroot

  • White Papers // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

    Sponsored By Webroot

  • White Papers // May 2015

    The 12 Leading Players in the Corporate Web Security - Market Quadrant

    Webroot has again been identified as a “Trail Blazer” in the Corporate Web Security Market Quadrant 2014 report by The Radicati Group. The independent analysis recognizes Webroot SecureAnywhere® Web Security Service for its cloud-based threat detection, predictive threat intelligence and robust content filtering. The report includes in-depth, expert analysis of...

    Sponsored By Webroot

  • White Papers // Apr 2015

    Five Stages of a Web Malware Attack

    Today’s web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This whitepaper shows you how modern web attacks work, broken down into five stages, from entry through execution.

    Sponsored By Sophos

  • White Papers // Apr 2015

    Enterprise Mobility Management Buyers Guide

    This EMM buyers guide will walk you through the process of selecting the right mobile solution to fit your company’s BYOD objectives. It explains how an effective EMM system can support an organisation's workforce mobility strategy, ensure compliance, protect corporate data and provide centralised management of devices and apps while...

    Sponsored By Sophos

  • White Papers // Mar 2015

    Endpoint Buyers Guide

    Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

    Sponsored By Sophos