Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • How to Produce a World-Class Threat Intelligence Capability

    White Papers // Apr 2016 // provided by Recorded Future

    Learn how to overcome the political inertia that often accompanies building a threat intelligence team from the ground up. This white paper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats. Discover the six core ...

    Read more
  • Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence

    White Papers // Apr 2016 // provided by Recorded Future

    Combat threats by understanding your adversaries and the tools, techniques, and processes (TTPs) they're likely to weaponize. This white paper shares research on the latest attacker tools, provides architecture recommendations for organizations looking to strengthen security controls, and helps analysts use threat intelligence to more quickly and effectively identify ...

    Download Now
  • How to Produce a World-Class Threat Intelligence Capability

    White Papers // Apr 2016 // provided by Recorded Future

    Learn how to overcome the political inertia that often accompanies building a threat intelligence team from the ground up. This white paper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats. Discover the six core ...

    Download Now
  • Advanced Threat Protection Buyer’s Guide

    White Papers // Apr 2016 // provided by FORTINET

    Sandboxing appliances are a critical part of your network’s defense, but attackers continue to create malicious tools that your sandbox alone may not be able to detect. Choosing the right security coverage model for your infrastructure is an important step for security your entire network. Learn about common considerations, and ...

    Read more
  • Securing Your Network and Application Infrastructure

    White Papers // Apr 2016 // provided by FORTINET

    The risk of a breach is growing rapidly due to more devises and more applications hitting your infrastructure. We asked security experts about their biggest concerns for advanced persistent threats and application based attacks. Two Security experts reveal their challenges and share advice on advance persistent threats. Read what ...

    Read more
  • Executive Summary: Defend Against the Undetected

    White Papers // Apr 2016 // provided by FORTINET

    It can be a challenge for companies to have true visibility into every corner of their network. Multiple security products from multiple security vendors can often leave you with unseen gaps in your infrastructure, increasing the chances that an attacker will be successful in gaining access to your critical data. ...

    Read more
  • NSS Labs Technology Brief: Better Integration. Better Protection

    White Papers // Apr 2016 // provided by FORTINET

    Security staff today has a difficult job: traffic in and out of networks continues to grow unabated, and there simply aren’t enough eyes in the world to watch every email, every webpage, and every packet. How are enterprises supposed to react to the massive torrent of data pouring into networks? ...

    Read more
  • The Importance of Integrated Server Rooms

    Ebooks // Apr 2016 // provided by IBM

    This resource explores the need for organisations to grow their server data centre with ready-to-deploy server room-in-a-box solution that address your growing business needs. In this resource you'll find out how to reduce costs of your infrastructure by up to 25% whilst reducing energy consumption by 40%. Look into how ...

    View this now
  • Securing a Mobile Environment

    White Papers // Apr 2016 // provided by Singtel 

    While mobility is viewed as key computing mode for employees, partners and even customers, many large enterprises are neglecting the need for mobile security. Ignoring the recommendations for protecting mobile devices, and exposing a business to vulnerabilities can have detrimental effect. It not only exposes sensitive corporate data, ...

    Learn more
  • Micro-Segmentation For Dummies

    White Papers // Apr 2016 // provided by VMware

    This book provides a broad overview of micro-segmentation in the data center. After reading this book, you’ll have a good basic understanding of micro-segmentation — like you’d get from a college-level 101 class, but far more interesting than Microbiology 101 or Microeconomics 101 (and not as difficult either)!

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?