Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Simplify Your Network Security with All-In-One Unified Threat Management

    White Papers // Dec 2015 // provided by Singtel 

    Singtel Managed Unified Threat Management (UTM) Services, powered by Trustwave, consolidate perimeter network security technologies – including firewall, web and email gateways, intrusion prevention and more – into an affordable, threat management service. Find out the benefits of consolidated single network device with critical perimeter network security, backed by 24x7x365 ...

    Download Now
  • The Fusion of Financial Services, Mobility and Identity

    White Papers // Dec 2015 // provided by Telstra

    The adoption of mobile digital technology can create opportunity, but may expose institutions to risk. Mobile identity is a fundamental enabler for innovation, and – just as importantly – that mobile identity is critical to the trust relationships that will unlock access to many wonderful new experiences that will be ...

    Download Now
  • The Three Dimensions of Digital Business

    White Papers // Dec 2015 // provided by Telstra

    The choice to embrace a digital business can be driven by a number of factors, including benefits to the user in terms of customer experience and/or better utilisation of assets or efficiency of operations. Thankfully, powerful new technologies are enabling both an improved customer experience across all industries as well ...

    Download Now
  • Gartner Report on The Three Dimensions of Digital Business

    White Papers // Dec 2015 // provided by Telstra

    The choice to embrace a digital business can be driven by a number of factors, including benefits to the user in terms of customer experience and/or better utilisation of assets or efficiency of operations. Thankfully, powerful new technologies are enabling both an improved customer experience across all industries as well ...

    Download Now
  • How to Protect Our Digital World from Cyber Attacks

    Videos // Nov 2015 // provided by IBM Security Intelligence

    A security officer has to be right all the time, the hacker has to be right once. Cybercriminals continuously target financial institutions, enterprises, eCommerce sites and other organizations to steal money and valuable business information. Trusteer, a leading provider of endpoint and clientless cybercrime prevention solutions, now joins IBM ...

    Watch Now
  • 2015 Cost of Data Breach Study: India

    White Papers // Nov 2015 // provided by IBM Security Intelligence

    IBM and Ponemon Institute are pleased to present the 2015 Cost of Data Breach Study: India, our fourth annual benchmark study on the cost of data breach incidents for companies based in India.

    Download Now
  • IBM X-Force Threat Intelligence Quarterly, 3Q 2015 - IBM

    White Papers // Nov 2015 // provided by IBM Security Intelligence

    Our report this quarter opens with a discussion of ransomware. The media tends to cover data breaches more often than ransomware incidents, but ransomware presents a growing threat. The FBI estimates that just one ransomware threat, CryptoWall, has so far netted its operators about USD18 million. Even law enforcement organizations ...

    Download Now
  • The Five Knows of Cyber Security

    White Papers // Nov 2015 // provided by Telstra

    While the cyber threat isn’t new, cyberspace allows crime, espionage and protest to happen at a pace, scale and reach that is unprecedented. The Five Knows of Cyber Security represents a significant shift in focus - from a technology discussion to one where senior management can engage in and ...

    Download Now
  • Ponemon "Cost of Data Breach" study

    White Papers // Nov 2015 // provided by IBM

    The 2015 Cost of Data Breach Study: Impact of Business Continuity Management is an annual special report that analyzes the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of a data breach. Many companies have a BCM function or team that is ...

    Download Now
  • 2015 Cost of Cyber Crime Study - Ponemon Institute

    White Papers // Nov 2015 // provided by Hewlett Packard Enterprise

    The headlines tell us hackers are winning-and in some cases they are. Ponemon Institute 2015 Cost of Cyber Crime Study has conducted more 2,000 interviews with senior professionals in 252 companies in seven countries and found that companies worldwide lost an average of $7.7 million each to cyber crime last ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?