Techworld

Risk Whitepapers


Sort by: Date | Company | Title


New Study Reveals Benefits from a Single Vendor, Multi-layered Solution
By Trend Micro | 29/5/2014
In a new custom study commissioned by Trend Micro, Forrester Consulting surveyed over 1100 IT security decision makers from North American, European, and Asia Pacific companies with 100-5,000 employees. The study identifies the benefits these IT professionals found from having a single-vendor, multi-layered solution. The benefits are: - Reduced operational friction - Reduced cost - Better protection Complete User Protection Trend Micro Complete User Protection is a multi-layer solution that provides your customers with the broadest range of interconnected threat and data protection across endpoints, email and collaboration, web, and mobile devices.
Download this now


Top 20 Critical Security Controls - Compliance Guide
By Rapid7 | 31/3/2014
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
Download this now


eBook: Five Mobile Collaboration Threats Facing All Enterprises
By Good Technology | 13/2/2014
Security and convenience should not be a zero-sum game. Security must not block progress to transform businesses. Likewise, mobile collaboration presents a tremendous opportunity for businesses. Read this paper to understand the five primary threats and how to both address risks and gain process efficiencies through secure mobility.
Download this now


50 Questions When Considering The Cloud
By Lyris Technologies | 30/1/2014
When considering whether or not to move to the cloud, there’s many questions you need to consider, and it’s unlikely that any single vendor will provide all the answers. This whitepaper provides your organisation a detailed list of security considerations to discuss both internally and with transparent vendors. Finding the right answers will help you develop a proper risk assessment and make informed decisions about cloud computing in your business.
Download this now


The Application Usage and Threat
By Palo Alto Networks | 14/11/2013
This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers