logo

Qualys

Six Essential Elements of Web Application Security

Provided by Qualys

If your web applications are breached, enormous amounts of sensitive business data can be lost. But, if you’re like most competitive businesses, your application developers and operation teams are under constant pressure to move quickly. Everybody wants...

View Abstract | Read White paper

Qualys

The Big Shift to Cloud-based Security

Provided by Qualys

Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement...

View Abstract | Read White paper

MobileIron

The Top Ten Things CIOs Ask About Enterprise Mobility

Provided by MobileIron

The landscape for technology has developed at a rate that is much quicker than people thought it would. With this new landscape, comes new technologies, especially the addition of laptops, mobile phones, and tablets in all office spaces around the world....

View Abstract | Read White paper

MobileIron

Security for the Mobile First Era

Provided by MobileIron

Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional...

View Abstract | Read White paper

Core Security

Attack Intelligence: Why It Matters

Provided by Core Security

Today, many organizations rely heavily on a “detect and respond” strategy to secure their most critical business assets. While detection of incidents is becoming more real-time in practice, this approach still requires that information security teams...

View Abstract | Read White paper

Core Security

The Threat & Vulnerability Management Maturity Model

Provided by Core Security

Organizations of all shapes and sizes, for profit and nonprofit, private enterprise and government, are facing the very significant risk that malicious individuals could breach their critical computing and data assets. And this problem is growing at an...

View Abstract | Read White paper

Juniper Networks

Networks That Know Security eBook

Provided by Juniper Networks

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

View Abstract | Read White paper

Juniper Networks

Top 10 Considerations for Securing Private Clouds

Provided by Juniper Networks

Get expert advice on how to keep your private cloud secure with our Top 10 Considerations Slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your...

View Abstract | Read White paper

Digital Reality

The Secure Data Center: An Integrative Approach to Achieving Holistic Security

Provided by Digital Reality

Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and...

View Abstract | Read White paper

Verisign

2014 Q4 DDoS Attack Trends

Provided by Verisign

Verisign has a unique view into distributed denial ofservice (DDoS) attack trends, including attack statistics, behavioral trends and future outlook. The below data contains observations and insights about attack size and frequency derived from mitigations enacted...

View Abstract | Read White paper

Search by Category