Techworld

White Papers: security


Sort by: Date | Company | Title


Top 10 reasons to strengthen information security with desktop virtualization
By Citrix | 25/3/2014
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
Download this now


4 Secrets to Meaningful Security Discussions with the Board of Directors
By Citrix | 21/3/2014
Corporate boards are more interested in security than ever before. Here’s how to engage them in a strategic dialogue about a topic with bottom-line implications.
Download this now


3 Strategies to Manage Compliance Mandates
By Citrix | 21/3/2014
Meeting security-related compliance requirements is an increasingly complex job. Follow these best practices to easily manage compliance.
Download this now


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


Software Defined Protection - The Enterprise Security Blueprint
By CheckPoint | 11/3/2014
In a world with high-demanding IT infrastructures and networks, where perimeters are no longer well defined and where threats grow more intelligent every day, we need to define the right way to protect enterprises in the ever-changing threat landscape. Download today to define your security blueprint.
Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014
This report assesses the current state and effectiveness of vulnerability management.
Download this now


Keeping up with an Increasingly Sophisticated Threat Environment
By Tenable Network Security | 10/3/2014
Relying on traditional signature based Anti Virus alone is simply not sufficient to prevent today’s onslaught of new, sophisticated and advanced malware. This whitepaper describes in detail, some trends and statistics on the malware detection, it then introduces a multi-vector approach to accurately detect malware in the IT environment, and verify that existing anti malware already deployed are functioning optimally.
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers