Threats Whitepapers

Sort by: Date | Company | Title

Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015

The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014.

This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.

Download this now

The F5 DDoS protection reference architecture
By F5 Networks | 12/11/2014

For the foreseeable future, a two-tier DDoS protection architecture should continue to provide the flexibility and manageability that today’s architects need to combat the modern DDoS threat. This recommended DDoS protection reference architecture leverages F5’s long experience combatting DDoS attacks with its customers. •Learn the four categories of DDoS threats and the recommended mitigation architectures •Answer why you should consider a cloud based scrubbing service and how to choose one •Understand the benefits to a multi-tier DDoS protection architecture

Download this now

Filling the threat management gateway void with F5
By F5 Networks | 12/11/2014

The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. •See the alternative paths to security after the discontinuation of the popular Microsoft Forefront TMG •Understand the important standards needed for new solutions to safeguard web access •Learn the four functions needed to ensure secure and managed access to Internet resources

Download this now

Fight malware, malfeasance, and malingering with F5
By F5 Networks | 12/11/2014

Organisations are seeking greater control over their outbound security. They’re looking to find solutions that offer the greatest protection and control to prevent data loss, ensure compliance and increase productivity. Where should they start? •Every year brings an even more extreme set of threats to the enterprise than the last •The push for increased confidentiality and the use of SSL everywhere has made it more difficult for enterprises to monitor Internet usage •While there are solutions that can help mitigate some of these risks, it’s critical for enterprises to adopt a comprehensive and streamlined way to maintain visibility and control

Download this now

14 Tips for your Data Protection Plan
By Symantec | 14/10/2014

This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment

Download this now

Advanced persistent threats: Hijacking insider credentials
By Attachmate Australasia | 13/8/2014

Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk

Download this now

New Study Reveals Benefits from a Single Vendor, Multi-layered Solution
By Trend Micro Australia | 29/5/2014

In a new custom study commissioned by Trend Micro, Forrester Consulting surveyed over 1100 IT security decision makers from North American, European, and Asia Pacific companies with 100-5,000 employees.

The study identifies the benefits these IT professionals found from having a single-vendor, multi-layered solution. The benefits are:

- Reduced operational friction - Reduced cost - Better protection

Complete User Protection Trend Micro Complete User Protection is a multi-layer solution that provides your customers with the broadest range of interconnected threat and data protection across endpoints, email and collaboration, web, and mobile devices.

Download this now

Internet Security Threat Report 2014
By Symantec | 22/5/2014

Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.

Download this now

Software Defined Protection - The Enterprise Security Blueprint
By Check Point Software Technologies | 11/3/2014

In a world with high-demanding IT infrastructures and networks, where perimeters are no longer well defined and where threats grow more intelligent every day, we need to define the right way to protect enterprises in the ever-changing threat landscape. Download today to define your security blueprint.

Download this now

Reducing Costs With Next-generation Firewalls
By Palo Alto Networks | 14/11/2013

For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.

Download this now

Top Whitepapers

Featured Whitepapers