Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Blue Coat/Elastica “Shadow Data Report” 2015

    Research // Feb 2016 // provided by Blue Coat Systems

    Based on the analysis of over 63M documents shared in the cloud, this report highlights key trends and insights into the usage and security of cloud apps and the data residing in them.

    Download Now
  • Magic Quadrant for Enterprise Network Firewalls

    Research // Nov 2015 // provided by Palo Alto

    Gartner, Inc. has released the latest Magic Quadrant for Enterprise Network Firewalls, and for the fourth year, we have been positioned in the "Leaders" quadrant. You can ask any one of us, this achievement has taken a lot of hard work. We’re proud to be here and excited to keep ...

    Download Now
  • Buyers Guide: Cybersecurity - The Definitive Guide for Evaluating Cybersecurity Solutions

    Research // Oct 2015 // provided by Palo Alto Networks

    In this comprehensive guide, you'll get recommended criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

    Download Now
  • Cisco Annual Security Report 2015

    Research // Mar 2015 // provided by Cisco Systems

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between ...

    Download Now
  • Frost Industry Quotient - Asia- Pacific Network Firewall Vendors 2014

    Research // Mar 2015 // provided by Cisco Systems

    A new paradigm shift in IT security is starting to emerge as enterprises begin to accept the possibility that their organizations may be breached, even after they have invested significantly in security technologies to prevent such incidents from happening. As a result, more enterprises are looking beyond a preventive approach, ...

    Download Now
  • Definitive Guide to Advanced Threat Protection

    Research // Feb 2015 // provided by FireEye

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are ...

    Download Now
  • Gartner Magic Quadrant for Secure Email Gateways, 2015

    Research // Dec 2014 // provided by Proofpoint, Inc.

    Whether you’re looking to stop advanced inbound email threats from entering your organization or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email, you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be named ...

    Download Now
  • Gartner Magic Quadrant for Enterprise Information Archiving, 2014

    Research // Dec 2014 // provided by Proofpoint, Inc.

    Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly ...

    Download Now
  • Mitigating Multiple DDoS Attack Vectors

    Research // Dec 2014 // provided by F5

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic ...

    Download Now
  • IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    Research // Nov 2014 // provided by Dell and Intel

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?