Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • The Importance of Integrated Server Rooms

    Ebooks // Apr 2016 // provided by IBM

    This resource explores the need for organisations to grow their server data centre with ready-to-deploy server room-in-a-box solution that address your growing business needs. In this resource you'll find out how to reduce costs of your infrastructure by up to 25% whilst reducing energy consumption by 40%. Look into how ...

    View this now
  • SC Mag Cyberthreat Intelligence eBook

    Ebooks // Mar 2016 // provided by LogRhythm

    Cyberthreat intelligence (CTI) is evidencebased knowledge – including context, mechanisms, indicators, implications and actionable advice – about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard, according to Gartner.

    View this now
  • E-Book: Future-Ready Identity and Access Management

    Ebooks // Nov 2015 // provided by Dell Software

    So your user access is secure today, but what happens when a new system is introduced? Or when a group of users changes roles and needs a different type of access? Learn five fundamentals that can help you address identity and access management (IAM) challenges today and tomorrow. Read the ...

    View this now
  • Trade Secrets from Security Experts

    Ebooks // Mar 2016 // provided by FORTINET

    The risk of a breach is growing rapidly due to more devises and more applications hitting your infrastructure. We asked security experts about their biggest concerns for advanced persistent threats and application based attacks. Two Security experts reveal their challenges and share advice on advance persistent threats. Read what they ...

    View this now
  • Encrypted Traffic Management For Dummies, Blue Coat Special Edition

    Ebooks // Feb 2016 // provided by Blue Coat Systems

    Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic ...

    View this now
  • The Ultimate Guide to Web Performance Monitoring

    Ebooks // Aug 2015 // provided by Catchpoint Systems

    Web performance impacts your users’ experience, how they view your brand, and whether they browse, consume content, purchase, or return to your site. User satisfaction, engagement, conversion rates, and business revenue depend on your quality of performance. This comprehensive guide to proactive web monitoring will help take your business to ...

    View this now
  • Catchpoint: The Ultimate Guide to Web Performance Monitoring

    Ebooks // Aug 2015 // provided by Catchpoint Systems

    Web performance impacts your users’ experience, how they view your brand, and whether they browse, consume content, purchase, or return to your site. User satisfaction, engagement, conversion rates, and business revenue depend on your quality of performance. This comprehensive guide to proactive web monitoring will help take your business to ...

    View this now
  • Stopping Zero-Day Exploits For Dummies, 2nd Edition

    Ebooks // Aug 2015 // provided by IBM

    This e-book examines today’s enterprise threat landscape and introduces IBM Security’s new endpoint solution to help stop exploits & targeted attacks.

    View this now
  • Advanced Threat Protection Mahjong Game

    Ebooks // Jul 2015 // provided by IBM

    Play this fun and simple tile matching game for a quick crash course on how to prevent, detect, and respond to advanced threats. Pick up some facts from IBM X-Force and the Ponemon Institute, and learn how the IBM Threat Protection System is fueling powerful competitive advantage without sitting through ...

    View this now
  • 5. Cloud: security threat or opportunity?

    Ebooks // May 2015 // provided by IBM

    5 of 5 ebooks in the Steps to Cloud Expertise Series

    View this now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?