Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Research // Dec 2014

    Gartner Magic Quadrant for Secure Email Gateways, 2015

    Whether you’re looking to stop advanced inbound email threats from entering your organization or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email, you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be named...

    Sponsored By Proofpoint, Inc.

  • Research // Dec 2014

    Gartner Magic Quadrant for Enterprise Information Archiving, 2014

    Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly...

    Sponsored By Proofpoint, Inc.

  • Research // Mar 2015

    Cisco Annual Security Report 2015

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between...

    Provided By Cisco Systems

  • Research // Mar 2015

    Frost Industry Quotient - Asia- Pacific Network Firewall Vendors 2014

    A new paradigm shift in IT security is starting to emerge as enterprises begin to accept the possibility that their organizations may be breached, even after they have invested significantly in security technologies to prevent such incidents from happening. As a result, more enterprises are looking beyond a preventive approach,...

    Provided By Cisco Systems

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Provided By FireEye

  • Research // Dec 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Provided By F5

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Provided By Dell and Intel

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Provided By Webroot

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Provided By MobileIron

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Provided By Cisco Systems

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Provided By Blue Coat Systems

  • Research // Sep 2014

    Frost & Sullivan - Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

    This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attacks and...

    Provided By Arbor Networks

  • Research // Sep 2014

    Scale Your Data Center - Right into the Cloud

    Ignoring the cloud is no longer an option. The potential benefits in agility and efficiency are simply too great. But turning your data center into a private cloud can be complex. Intel, Microsoft and Dell have found the solution to this major challenge. Download this report to learn how you...

    Provided By Dell and Intel®

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Provided By Cisco Systems

  • Research // Aug 2014

    Infographic: Understanding the real value of Big Data

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for all sorts of organizations. See this infographic read to discover why big data matters to you and your organization.

    Provided By Workday

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Provided By HP

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Oct 2013

    IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see...

    Provided By ZDNet

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Sep 2013

    Software License Audit: Breeze it and Beat it with Dell KACE!

    For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...

    Provided By Dell Kace

  • Research // Aug 2013

    Future of Sales Performance Whitepaper (Nucleus)

    Learn how the future of sales performance management is integrated with CRM and social collaboration and how this will help managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results. Download now!

    Provided By Salesforce.com

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By Open Text

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    IBM X-Force 2012 Mid Year Trend and Risk Report

    The IBM X-Force 2012 Mid Year Trend and Risk provides a detailed analysis and summary of the latest internet threats including vulnerability disclosures, exploits and active attacks, viruses and other malware, spam, phishing, malicious web content and risk stemming from emerging trends including "bring your own" mobile device challenges and...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Forrester TAP-Analyst report: Cloud-Based Disaster Recovery Barriers And Drivers In The Enterprise A Custom Technology Adoption Profile Commissioned By IBM (Research Report)

    The necessity of building a disaster recovery model to ensure that services can be delivered nonstop with minimal data loss is not easy or inexpensive. Read this research report to learn how the cloud offers companies an alternative, allowing for rapid recovery and minimal data loss, and without the high...

    Provided By IBM

  • Research // Jan 2013

    Avoid vulnerabilities and threats in the cloud - What your organization needs to know about security in the cloud

    Like any other technology, there are vulnerabilities that attackers look for in the cloud; however, users can make the cloud a safer place by becoming aware of these security challenges and how to address them. Read this article to learn more about the environment in which your organization is working,...

    Provided By IBM

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Nov 2012

    Emerging threats: How to protect your business

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take...

    Provided By ZDNet

  • Research // Oct 2012

    ESG Research Report: New NetVault Backup Licensing Model

    Why are traditional backup licensing models outdated - and costly - in today's data-protection environment? In this Enterprise Strategy Group product brief, learn about the specific changes in the data protection industry, and how these shifts have affected changes in backup licensing models. Then, discover the drivers that are shaping...

    Provided By Dell Software

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Jun 2012

    Insider threats: Defending against costly breaches

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much...

    Provided By ZDNet

  • Research // May 2012

    How IT is ganging up on organised cybercrime

    Lone criminals no longer dominate digital crime. According to research from Detica, 80 percent of internet crime is perpetrated by co-ordinated groups. Cybercriminals are working together to wreak havoc on businesses and governments, and the public and private sectors are both facing a full spectrum of threats, from financial crime...

    Provided By ZDNet

  • Research // May 2012

    Internet Security Threat Report 2012

    Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, a system of more than 5 million decoy accounts and more. Over 8 billion email messages and more than 1.4 billion web requests are processed each day across 15 data centres. Symantec also...

    Provided By Symantec (formerly VeriSign)

  • Research // Mar 2012

    IT Priorities Special Report: Security. Emerging Technologies, and the

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Research // Dec 2014

    Gartner Magic Quadrant for Secure Email Gateways, 2015

    Whether you’re looking to stop advanced inbound email threats from entering your organization or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email, you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be named...

    Sponsored By Proofpoint, Inc.

  • Research // Dec 2014

    Gartner Magic Quadrant for Enterprise Information Archiving, 2014

    Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly...

    Sponsored By Proofpoint, Inc.

  • Research // Mar 2015

    Cisco Annual Security Report 2015

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between...

    Provided By Cisco Systems

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Provided By Dell and Intel

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // May 2012

    Internet Security Threat Report 2012

    Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, a system of more than 5 million decoy accounts and more. Over 8 billion email messages and more than 1.4 billion web requests are processed each day across 15 data centres. Symantec also...

    Provided By Symantec (formerly VeriSign)

  • Research // Nov 2012

    Emerging threats: How to protect your business

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take...

    Provided By ZDNet

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Feb 2013

    IBM X-Force 2012 Mid Year Trend and Risk Report

    The IBM X-Force 2012 Mid Year Trend and Risk provides a detailed analysis and summary of the latest internet threats including vulnerability disclosures, exploits and active attacks, viruses and other malware, spam, phishing, malicious web content and risk stemming from emerging trends including "bring your own" mobile device challenges and...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Forrester TAP-Analyst report: Cloud-Based Disaster Recovery Barriers And Drivers In The Enterprise A Custom Technology Adoption Profile Commissioned By IBM (Research Report)

    The necessity of building a disaster recovery model to ensure that services can be delivered nonstop with minimal data loss is not easy or inexpensive. Read this research report to learn how the cloud offers companies an alternative, allowing for rapid recovery and minimal data loss, and without the high...

    Provided By IBM

  • Research // Jan 2013

    Avoid vulnerabilities and threats in the cloud - What your organization needs to know about security in the cloud

    Like any other technology, there are vulnerabilities that attackers look for in the cloud; however, users can make the cloud a safer place by becoming aware of these security challenges and how to address them. Read this article to learn more about the environment in which your organization is working,...

    Provided By IBM

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By Open Text

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Research // Mar 2012

    IT Priorities Special Report: Security. Emerging Technologies, and the

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By ZDNet

  • Research // Jun 2012

    Insider threats: Defending against costly breaches

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much...

    Provided By ZDNet

  • Research // May 2012

    How IT is ganging up on organised cybercrime

    Lone criminals no longer dominate digital crime. According to research from Detica, 80 percent of internet crime is perpetrated by co-ordinated groups. Cybercriminals are working together to wreak havoc on businesses and governments, and the public and private sectors are both facing a full spectrum of threats, from financial crime...

    Provided By ZDNet

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Sep 2013

    Software License Audit: Breeze it and Beat it with Dell KACE!

    For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...

    Provided By Dell Kace

  • Research // Aug 2013

    Future of Sales Performance Whitepaper (Nucleus)

    Learn how the future of sales performance management is integrated with CRM and social collaboration and how this will help managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results. Download now!

    Provided By Salesforce.com

  • Research // Dec 2011

    Hacktivism: Threats and reality for IT managers

    In 2011, the Anonymous and LulzSec collectives made front-page news. Similarly, data breaches from lost laptops and malware seemed to pop up on a weekly basis. But using DDoS attacks and other hacks as a form of protest - or 'hacktivism' - isn't a new phenomenon, and neither is lost...

    Provided By ZDNet

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Provided By HP

  • Research // Dec 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Provided By F5

  • Research // Sep 2014

    Scale Your Data Center - Right into the Cloud

    Ignoring the cloud is no longer an option. The potential benefits in agility and efficiency are simply too great. But turning your data center into a private cloud can be complex. Intel, Microsoft and Dell have found the solution to this major challenge. Download this report to learn how you...

    Provided By Dell and Intel®

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Provided By Cisco Systems

  • Research // Sep 2014

    Frost & Sullivan - Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

    This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attacks and...

    Provided By Arbor Networks

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Provided By Blue Coat Systems

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Provided By Cisco Systems

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Provided By MobileIron

  • Research // Aug 2014

    Infographic: Understanding the real value of Big Data

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for all sorts of organizations. See this infographic read to discover why big data matters to you and your organization.

    Provided By Workday

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Provided By Webroot

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Provided By FireEye

  • Research // Mar 2015

    Frost Industry Quotient - Asia- Pacific Network Firewall Vendors 2014

    A new paradigm shift in IT security is starting to emerge as enterprises begin to accept the possibility that their organizations may be breached, even after they have invested significantly in security technologies to prevent such incidents from happening. As a result, more enterprises are looking beyond a preventive approach,...

    Provided By Cisco Systems

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Oct 2013

    IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see...

    Provided By ZDNet

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva