Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // May 2015

    Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall

    Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges....

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Next-Generation Network Security: A Buyers’ Guide

    Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Types of cyber-attacks and how to prevent them

    How secure is your network? Explore the four primary strategies cybercriminals employ to infiltrate your network when you read this e-book, and learn how to apply best practices to counter them. Then discover what your firewall needs to do to counter cyber-attacks. Download the e-book today.

    Sponsored By Dell

  • White Papers // May 2015

    Strategies for Successfully Managing Privileged Accounts

    See how to prepare your organization for the security, management and governance you need for your superuser accounts. This informative ebook offers perspectives you can use to integrate a successful PAM program.

    Sponsored By Dell Software

  • White Papers // May 2015

    Three key ways to protect data at all levels

    The French Ministry of Education is France’s largest employer, overseeing 30 academies throughout the country. They chose McAfee Next Generation Firewall not only because it complies with regulatory guidelines but also because it protects their networks in all their different configurations. Download this case study and learn what other benefits...

    Sponsored By Intel Security

  • White Papers // May 2015

    The power of change

    RWTH Aachen is one of Europe’s most distinguished technological universities, with 7,500 employees and 40,000 students who rely on secure access to applications and data. Similar to other research-oriented institutions, they knew they were an attractive target for cyberattacks, so at the end of 2013, the university chose to renew...

    Sponsored By Intel Security

  • Downloads // May 2015

    Do your digital assets have real-world protection from advanced cyber-attacks?

    Intel Security has developed the world’s first software-based testing environment for advanced evasion techniques (AETs). With this free security tool, you can test your organization’s network security devices against AETs that are increasingly used in sophisticated and targeted cyberattacks: • Launch controlled AET-borne attacks at your own defense technology....

    Sponsored By Intel Security

  • White Papers // May 2015

    Dealing with Data Breaches and Data Loss Prevention

    As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the...

    Sponsored By Proofpoint, Inc.

  • White Papers // May 2015

    Defending Against Advanced Threats - Addressing the Cyber Kill Chain

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how...

    Sponsored By Proofpoint, Inc.

  • White Papers // May 2015

    The New Phishing Threat: Phishing Attacks

    Learn about the Latest Email Security Threats. Phishing The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails. Historically, phishing attacks targeted end-users with attackers...

    Sponsored By Proofpoint, Inc.

  • White Papers // May 2015

    Quantifying Business Advantage - The Value of Database Selection

    Relational databases can frustrate you as well, holding back your best ideas. But now there is a better way. After trying for two years to build a single view of their customer on a relational database, one of the world’s leading insurance companies migrated to MongoDB and delivered the...

    Sponsored By MongoDB

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // May 2015

    Keep Cyber Threats From Destroying Your Organization

    As security threats grow and become more malicious, the opportunities for security breaches increase as well. Keeping up with the threats and methods of protecting sensitive data places a huge burden on IT departments. Learn how you can ease that burden for your IT department.

    Sponsored By LabTech Software

  • White Papers // May 2015

    Protecting Your Company From a Data Disaster

    Unexpected data loss can occur at any time. Whether due to natural disasters such as floods, hurricanes and tornadoes or to more common events such as water main breaks, building fires and hardware failures, the consequences of data loss can be extensive and far-reaching. As an IT professional, it's up...

    Sponsored By LabTech Software

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • White Papers // May 2015

    4 Security Industry Analyst Recommendations on DDoS Protection

    Neustar found that many of the recommendations are currently found in SiteProtect DDoS protection services with future trends aligned to near term implementation. Following are 4 key take-aways with insights to the report’s DDoS protection recommendations.

    Sponsored By Neustar

  • White Papers // May 2015

    Think You are Safe from DDoS Attacks?

    Amazon Web Services is the world’s top cloud platform. That’s probably why you’re on it – to enjoy reliable, scalable and affordable cloud computing. But while AWS excels at many things, it’s mainly left to the developer to protect against a range of cyberattacks, including DDoS. In fact, AWS does...

    Sponsored By Neustar

  • eBooks // May 2015

    5. Cloud: security threat or opportunity?

    5 of 5 ebooks in the Steps to Cloud Expertise Series

    Sponsored By IBM

  • White Papers // May 2015

    Step-by-Step Configuration Guide

    Security is a major concern for IT professionals when think about the implementation of cloud computing solutions. In overcoming those concerns and enabling the hosting of all workloads, including those that depend on sensitive information, robust security mechanisms play a vital role. Intel and Red Hat come together to provide...

    Sponsored By Intel & Red Hat

  • White Papers // May 2015

    Seven reasons why Microsoft Windows 8 is better with Intel Security

    Windows 8 is a complex operating system and sometimes exhibit critical vulnerabilities, which are promptly exploited by cyber-hackers. The fact that most Windows 7 applications will run natively on Windows 8 means that most malware will also run on Windows 8.So if you run, or are planning to deploy, Windows...

    Sponsored By Intel Security

  • White Papers // May 2015

    Protecting Against Mobile App SSL Vulnerabilities

    Have you thought about the many ways in which mobile apps may be exposing your company’s sensitive information to man-in-the-middle (MITM) attacks? Today, employees are easily enthralled by the excitement of new mobile apps, and rarely think about the risks that come along with these supposedly secure apps.This report, brought...

    Sponsored By Intel Security

  • White Papers // May 2015

    Webroot 2015 Threat Brief

    Did you know that: • 85,000 malicious IPs are launched every day? • Less than 55% of all URLs are Trustworthy? • 30% of Internet Users access Phishing sites? • 15% of New files are malicious executables? • Only 28% of mobile apps are trustworthy? The Webroot 2015 Threat Brief,...

    Sponsored By Webroot

  • White Papers // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

    Sponsored By Webroot

  • White Papers // May 2015

    The 12 Leading Players in the Corporate Web Security - Market Quadrant

    Webroot has again been identified as a “Trail Blazer” in the Corporate Web Security Market Quadrant 2014 report by The Radicati Group. The independent analysis recognizes Webroot SecureAnywhere® Web Security Service for its cloud-based threat detection, predictive threat intelligence and robust content filtering. The report includes in-depth, expert analysis of...

    Sponsored By Webroot

  • White Papers // May 2015

    Ten Sneaky Things a Spammer Will Do

    Spam will continue to plague Inboxes until it is no longer profitable for the spammer or there is a hack-proof method of prevention that is easy to use. Read this ebook and learn the techniques spammers employ to reach their target audience, and discover the solutions that can help protect...

    Sponsored By Dell Software

  • White Papers // May 2015

    Phishing: When Email is the Enemy

    Assuming your employees or spam filter can detect the difference between legitimate emails and phishing scams is not enough. Discover the challenges of staying ahead of phishing and learn a framework to incorporate anti-phishing actions into your existing security processes.

    Sponsored By Dell Software

  • White Papers // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

    Sponsored By Dell Software

  • White Papers // Apr 2015

    ESG Report: Network Encryption and its Impact on Enterprise Security

    Taken from a collaborative research survey of 150 IT and information security professionals, this report will evaluate the information security practices used to decrypt and inspect encrypted traffic and new technologies being adopted to protect organisation. Based upon the data collected, this paper concludes: Network encryption is ubiquitous and...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    ETM Comparison Matrix

    This Matrix will provide a comparison between the Encryption Traffic Management Solutions available to organisations today. The Report will examine why Blues Coat and their ETM is leading the way in providing organisations with the tools to combat hidden risks in your SSL and HTTPS traffic, enforce your policies, and...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    Videocast Demo: SSL Visibility Appliances today

    Learn how to maximize the features and functions of this powerful Encrypted Traffic Management (ETM) solution by watching our demo video. It shows you configuration best practices and step-by-step instructions on how to: Use the dashboard to monitor status, health, and connectivity of the system Optimize your use...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    The Visibility Void

    Attacks through HTTPS can be a vulnerability for enterprises. To identify hidden threats to the business, enterprises need complete visibility into encrypted traffic. However, to comply with local privacy regulations and their own acceptable use policies, enterprises must have the means to selectively decrypt this traffic. An encrypted traffic management...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    Protecting Exchange: Best Practices and Practical Tips

    Protecting email data is critical for today's organizations, yet most disaster-recovery plans don’t incorporate a comprehensive email data-protection strategy. Find out the best ways to safeguard precious email data in your Microsoft Exchange environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    How to Avoid the Coming Backup Crunch

    Data is exploding at a time when tolerances for loss are near zero. Learn about a proven solution that enables organizations to capture continuous backup snapshots, automate recoverability testing, and offload data deduplication/compression tasks using minimal infrastructure and human resources. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Disk Backup Appliances: The Next Generation

    Have you examined your backup strategy recently? You may be exposing your business to unnecessary risk and expense. Find out how you can save time on deployment, simplify day-to-day management, shrink your backup windows and significantly reduce your backup-storage footprint. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Dell Data Protection Point of View

    Your backup methodology depends on data classification, recovery objectives and IT infrastructure. Learn how to enable the best data-protection methods for your environment — safeguarding your organization’s critical information and applications - without adding excessive costs or complexity. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Building Higher IT Business Continuity in the Face of Disaster

    Some disasters, such as hurricanes, are preceded by a warning. Most are not. Forces of nature, malicious acts, or even human error can have a detrimental impact on your business. Be prepared by learning some first steps and follow-ups to upgrade your disaster preparedness. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Be a C-suite hero with these 5 key virtual + physical data protection takeaways.

    Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Unified Backup: Virtual & Physical

    Protecting data is a holistic practice; so, you're only as strong as your weakest link. Find out how the latest release of Dell AppAssure unifies virtualized stand-alone backup, replication and recovery processes — without compromising data protection. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    The Buyers Guide to Virtual and Physical Data Protection

    New technologies now make data protection faster and more reliable both for physical and virtual machines. Let this guide help you sort through traditional and cutting-edge data-protection solutions to find the best option for your environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Superior VMware® Protection for Limited IT Budgets

    A complete VMware data-protection strategy should offer protection for mission-critical applications, along with automated nightly backup and replication for less critical data. Find out the four major criteria for implementing cost-effective data protection in your own VMware environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Nov 2014

    The SIEM Who Cried Wolf: Focusing Your Cybersecurity Efforts on the Alerts that Matter

    Users cannot keep up. They cannot tell which alerts are important. Urgent warnings get lost in the noise. When valid warnings do appear, security teams don’t know what to do with them. For truly effective protection, security leaders must focus on the ability to detect true threats, quality of alerts...

    Sponsored By FireEye

  • White Papers // Nov 2014

    Cybersecurity’s Maginot Line: A real world assessment of the defense-in-depth model

    It doesn’t matter what types of firewall, intrusion prevention system (IPS), Web gateway, sandbox and endpoint systems make up organizations’ Maginot Line; attackers are circumventing them all. As this report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures...

    Sponsored By FireEye

  • White Papers // Mar 2015

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

    Sponsored By Sophos

  • White Papers // Nov 2014

    Achieving Security with Cloud Data Protection

    Today, more and more companies recognize the value and convenience of using cloud backup to protect their server data. HP Autonomy offers hosted data storage that enables you to reduce the costs, risks, and complexity of storing and protecting your business information. With a heightened focus on security, privacy, and...

    Sponsored By HP

  • White Papers // Mar 2015

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • eBooks // Nov 2014

    Analyzing the Neverquest Malware Threat

    Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works...

    Sponsored By F5

  • White Papers // Nov 2014

    Operationalizing the Network with SDN

    The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources─combined with increased mobility of apps migrating to the cloud and...

    Sponsored By F5

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Five Simple Strategies for Securing APIs

    APIs might represent increased risk for the enterprise, but the potential benefits they bring to an organisation can overshadow any inherent dangers. Read this eBook to understand the 3 attack vectors or watch with APIs, and 5 simple strategies to secure your APIs.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Choosing the Right API Management Solution for the Enterprise User

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    A How-to Guide to OAuth & API Security

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Sponsored By CA Technologies

  • White Papers // Dec 2014

    Does Application Security Pay?

    Measuring the Business Impact of Software Security Assurance Solutions With the escalating number and increasing sophistication of cyber attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don't open doors for hackers. Mainstay surveyed 12 organisations that implemented application vulnerability testing with HP Fortify. Their...

    Sponsored By HP

  • White Papers // Feb 2015

    Top 5 Reasons Why Cloud Security Beats Traditional Security

    Not long ago, security was viewed as one of the biggest obstacles to widespread adoption of cloud-based deployments for enterprise software solutions. With recent developments and cloud vendors living exclusively in the cloud world, they have managed to build a much higher level of data center and virtual system security...

    Sponsored By Infor

  • White Papers // Apr 2014

    5 Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider

    Over the last five years, many companies have re-signed with their legacy backup solution providers because the benefits of changing were not obvious. But data and information management and protection technologies are growing far more complex and dynamic than they’ve ever been, and new innovations can supply major advantages and...

    Sponsored By CommVault

  • White Papers // Apr 2014

    5 Fundamentals of Virtual Server Protection

    Server virtualization brings many well-known benefits, including cost efficiencies, management automation, and improved agility. Most enterprises are already invested heavily in virtualization technologies, but with these new operating models come challenges to data management and infrastructure protection. This whitepaper outlines five important considerations that must be addressed in order to...

    Sponsored By CommVault

  • White Papers // Aug 2014

    5 Strategies for Modern Data Protection

    Data growth, data center consolidation, server virtualization, and cloud services are wreaking havoc with conventional approaches to backup and recovery. This concise white paper presents five strategies for data protection - from deduplication to automation to granular recovery - that will not only help solve your current data management challenges...

    Sponsored By CommVault

  • White Papers // Jun 2015

    Gatepoint Research: Few Fully Prepared for Software Security Risks

    Hackers penetrate organisations and steal information through vulnerabilities in software applications. Yet less than half of IT organisations have confidence in the security of the software that runs their businesses. And just 11 percent say they know with confidence which applications are at risk. Those are among the findings of...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jun 2015

    Understanding Advanced Threats and How to Mitigate Them

    When you're a hacker, time is on your side. Time to find a soft spot in your armour, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenses - even sandboxing. You need a new approach. This SlashGuide whitepaper helps you understand advanced...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jun 2015

    State of Security Operations 2015

    Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. How does yours stack up to the best? And what should you do to improve? HP Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers worldwide. This...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // Jun 2015

    Enterprise Wi-Fi Buyers Guide: The Network Impact of 802.11ac

    This paper discusses two approaches for efficient WLAN design. Both let you integrate 802.11ac into your WLAN and both can help lay the foundation for future, high-speed technologies. Learn more about the advantages and disadvantages of these two approaches.

    Sponsored By Aerohive Networks

  • White Papers // Jun 2015

    Enterprise Wi-Fi Buyers Guide: Enabling The New Mobility

    With the tidal wave of mobile users, mobile applications & demand for pervasive access, it’s becoming clearer that prior-generation approaches to providing mobility are breaking. This paper describes how to eliminate the complexity & cost of traditional wireless networks and create one ready for mobility.

    Sponsored By Aerohive Networks

  • White Papers // Jun 2015

    Data Protection: Quality Plus Fast ROI

    Too many organizations today struggle with backup and recovery solutions that not only fail in their primary mission of reducing the risk of data loss but also cost far too much — in wasted IT staff time, reduced employee productivity, monthly fees and ever-growing storage requirements. You need reliable, automated...

    Sponsored By Dell

  • White Papers // Jun 2015

    Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    There is misalignment between what the business expects and what IT can actually deliver — especially when it comes to disaster recovery. Following these nine steps can help you organize your thoughts, ask the right questions and develop the right strategy to begin taking a more business-centric approach to disaster...

    Sponsored By Dell

  • White Papers // Jun 2015

    Redefining Your Data Protection Strategy: Focus on Recovery

    IT managers must contend with growing expectations from their end users and need to evaluate innovative new backup approaches to meet these needs. Purpose-built backup appliances are an increasingly popular storage technology that enables IT managers to meet their needs for a cost-efficient, easy to deploy and use data protection...

    Sponsored By Dell

  • White Papers // Apr 2015

    IDC: Calculating the Business Value of Next Generation Firewalls

    Unprecedented demand for business growth is driving the introduction of new applications and a mobile workforce scattered across the globe. Security often becomes an afterthought, leaving organisations at an increased risk of attack. But how can you justify the investment in a new, more effective solution? Eight Intel Security...

    Sponsored By Intel Security

  • White Papers // Apr 2015

    NSS Labs: Can your current firewall block 96.6% of attacks against your server applications?

    Or can it block 94.6% of attacks against client applications? NSS Labs performed an independent test to the McAfee Next Generation Firewall, subjecting it to thorough testing of key operational features such as security effectiveness, performance, stability, reliability, total cost of ownership and many more. Download this eye-opening report and...

    Sponsored By Intel Security

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    Whether man made or naturally occurring, disasters can be a real threat to a company’s survival. Some common disasters include : Catastrophic security compromise Fire Flood Earthquake Power failure This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your...

    Sponsored By Macquarie Telecom Australia

  • White Papers // Apr 2015

    ESG Report: Network Encryption and its Impact on Enterprise Security

    Taken from a collaborative research survey of 150 IT and information security professionals, this report will evaluate the information security practices used to decrypt and inspect encrypted traffic and new technologies being adopted to protect organisation. Based upon the data collected, this paper concludes: Network encryption is ubiquitous and...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // May 2015

    Three key ways to protect data at all levels

    The French Ministry of Education is France’s largest employer, overseeing 30 academies throughout the country. They chose McAfee Next Generation Firewall not only because it complies with regulatory guidelines but also because it protects their networks in all their different configurations. Download this case study and learn what other benefits...

    Sponsored By Intel Security

  • White Papers // May 2015

    The power of change

    RWTH Aachen is one of Europe’s most distinguished technological universities, with 7,500 employees and 40,000 students who rely on secure access to applications and data. Similar to other research-oriented institutions, they knew they were an attractive target for cyberattacks, so at the end of 2013, the university chose to renew...

    Sponsored By Intel Security

  • Downloads // May 2015

    Do your digital assets have real-world protection from advanced cyber-attacks?

    Intel Security has developed the world’s first software-based testing environment for advanced evasion techniques (AETs). With this free security tool, you can test your organization’s network security devices against AETs that are increasingly used in sophisticated and targeted cyberattacks: • Launch controlled AET-borne attacks at your own defense technology....

    Sponsored By Intel Security

  • White Papers // Apr 2015

    ETM Comparison Matrix

    This Matrix will provide a comparison between the Encryption Traffic Management Solutions available to organisations today. The Report will examine why Blues Coat and their ETM is leading the way in providing organisations with the tools to combat hidden risks in your SSL and HTTPS traffic, enforce your policies, and...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Mar 2015

    The Risk of “Free” Endpoint Security

    Everything in life comes at a price, even “free” endpoint protection. Every organisation has anti-virus/anti-malware solutions deployed, but how much have you actually reduced your risk? Read this insightful report by Aberdeen Group to understand the true risk of “free” endpoint protection.

    Sponsored By Intel Security

  • White Papers // Oct 2013

    Boost IT Visibility and Business Value

    Decision makers at many organizations question the investments made in IT. This is often because they don’t fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. Learn how creating a great...

    Sponsored By ServiceNow

  • White Papers // May 2015

    Seven reasons why Microsoft Windows 8 is better with Intel Security

    Windows 8 is a complex operating system and sometimes exhibit critical vulnerabilities, which are promptly exploited by cyber-hackers. The fact that most Windows 7 applications will run natively on Windows 8 means that most malware will also run on Windows 8.So if you run, or are planning to deploy, Windows...

    Sponsored By Intel Security

  • White Papers // May 2015

    Protecting Against Mobile App SSL Vulnerabilities

    Have you thought about the many ways in which mobile apps may be exposing your company’s sensitive information to man-in-the-middle (MITM) attacks? Today, employees are easily enthralled by the excitement of new mobile apps, and rarely think about the risks that come along with these supposedly secure apps.This report, brought...

    Sponsored By Intel Security

  • eBooks // Apr 2015

    Internet Security Threat Report 2015

    The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Key Findings: •...

    Sponsored By Symantec

  • White Papers // Apr 2015

    Videocast Demo: SSL Visibility Appliances today

    Learn how to maximize the features and functions of this powerful Encrypted Traffic Management (ETM) solution by watching our demo video. It shows you configuration best practices and step-by-step instructions on how to: Use the dashboard to monitor status, health, and connectivity of the system Optimize your use...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    The Visibility Void

    Attacks through HTTPS can be a vulnerability for enterprises. To identify hidden threats to the business, enterprises need complete visibility into encrypted traffic. However, to comply with local privacy regulations and their own acceptable use policies, enterprises must have the means to selectively decrypt this traffic. An encrypted traffic management...

    Sponsored By Blue Coat Systems, Inc.