Your Search returned 2 results from our Editorial content

Sort By

SECURITY POLICIES

Who is the Biggest Brother?

Kathryn Cave speaks to Rajiv Gupta, CEO of Skyhigh Networks about Big Brother, shadow IT and safety in the cloud

   
   

Your Search returned 39 results from our White Paper Library

Sort By
Sybase

Mobile Device Management

An IT Manager’s Guide to Managing Personal Devices in the...

You can't avoid it any longer: A strategy for managing employees' personal mobile devices. Learn how to create a more secure and manageable mobile enterprise...


Red Condor

Laptop Security

The New Threat Reality: Seven Threats to Watch Out For

New and emerging threats are comprised of highly sophisticated and potentially catastrophic campaigns. Cybercriminals use multiple components and social...


McAfee

Network Security

Network security for Midsize Organsations

Your network is one of five vulnerabilities faced by midsize organizations.


NetIQ

Intrusion Detection and Prevention

Reduce Your Breach Risk: File Integrity Monitoring for PCI...

This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in...


NetIQ

Data Privacy and Security

PCI X-Ray: File Integrity Monitoring

In the independent research report, “PCI X-Ray: File Integrity Monitoring,” Forrester Research, Inc. provides practical technical guidance on how File...


NetIQ

Data Privacy and Security

Achieving ROI from Your PCI Investment

This white paper describes the challenges of meeting PCI DSS compliance, as well as the ways in which organizations can leverage that work to provide better...


NetIQ

Cybercrime

Consensus Audit Guidelines: Prioritizing Security Controls...

The purpose of this white paper is to provide the reader with the keys to successfully implement the critical security controls listed in the CAG in order...


Symantec Corporation

Anti-Spam

Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...


Proofpoint

Email Encryption

Magic Quadrant for Secure E-Mail Gateways

The e-mail security market is very mature. Targeted phishing detection, outbound e-mail inspection, encryption and delivery form factor are the major differentiators....


IBM

Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Previous 1 3 4
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Is the internet a disappointment?