Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Wireless Security Survey 2015

    White Papers // Jan 2016 // provided by FORTINET

    This global survey studies the state of the market for WLAN Security deployed among 1,490 medium-to-large Enterprises across a broad range of industries, and shows that the majority of enterprises have critical gaps in their WLAN Security strategy.

    Download Now
  • Keeping SMBs safe

    White Papers // Dec 2015 // provided by SingTel

    In the world of security, working out who is behind a cyber attack is one of the hardest parts of dealing with any security incident - and it’s getting a lot harder. Although there’s a lot of headline grabbing attacks on large brand organisations, small and middle-market businesses (SMBs), might ...

    Download Now
  • An Infected Computer Can Seriously Hurt Your Business

    White Papers // Dec 2015 // provided by SingTel

    Protect your business with Singtel Managed Security Services, powered by Trustwave. Beyond just anti-virus, we deliver email protection for your business. With Singtel Managed Security Services, you are protected before and during cyber attacks.

    Download Now
  • Building Resilience in a Digital Enterprise

    White Papers // Dec 2015 // provided by Intel Security

    To be successful in business today, an enterprise must operate securely in the cyberdomain. We’re in a period of unprecedented change where transformation and disruptive technologies are the new constant. This transformation and disruption are having a profound effect on security perception and architecture within the business. Security is recognized ...

    Download Now
  • Tackling Attack Detection and Incident Response

    White Papers // Dec 2015 // provided by Intel Security

    The Enterprise Strategy Group (ESG) recently worked with Intel Security to analyze the results of a research project based upon a survey of 700 IT and security professionals at mid-market (i.e., 500 to 999 employees) and enterprise (i.e., more than 1,000 employees) organizations located in Asia, North America, EMEA and ...

    Download Now
  • When Minutes Count

    White Papers // Dec 2015 // provided by Intel Security

    The steady parade of attacks disclosed in 2014 has made it abundantly clear that current security efforts and checkbox compliance aren’t sufficient for data protection. In a new survey commissioned by McAfee, part of Intel Security, 74% of respondents remain highly concerned about their ability to handle targeted attacks and ...

    Download Now
  • A How-to Guide to OAuth & API Security

    White Papers // Dec 2015 // provided by CA Technologies

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Download Now
  • 5 Pillars of API Management

    White Papers // Dec 2015 // provided by CA Technologies

    Understand the what, why and how of the five key areas that supports an enterprise API Management strategy.

    Download Now
  • Choosing the Right API Management Solution for the Enterprise User

    White Papers // Dec 2015 // provided by CA Technologies

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Download Now
  • Protecting Your APIs against Attack and Hijack

    White Papers // Dec 2015 // provided by CA Technologies

    The pressure is on to securely connect the enterprise to mobile apps, cloud platforms and developer networks through APIs. But it is a mistake to think you can secure APIs using the same methods and technology as before. APIs have an entirely unique risk profile that must be addressed. ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?