• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Authentication & Access Systems
flow-image
Palo Alto Networks

Comprehensive Data Security in the Cloud

Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operations, reputation,...

Published: May 25, 2017
View More
flow-image
Kaspersky

Who's Spying on You?

In this report, Kaspersky Lab’s cybersecurity experts give you an insight into: • How businesses can suffer from direct – and indirect – cyber-espionage attacks • What you can do to protect your business… and its hard-won reputation • How specific technologies can...

Published: Feb 20, 2014
View More
flow-image
Kaspersky

Virtualization Security Is Not an Oxymoron

Virtualization is the simulation of software and/or a hardware platform that other software runs on. This simulated environment is a virtual machine (VM).  In full virtualization, one or more operating systems (OS) and their applications are run on top of the virtual hardware – each running as a “guest”...

Published: Apr 03, 2014
View More
flow-image
Google Chrome

Research reveals web browser is pivotal aspect of endpoint security strategy.

As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing...

Published: Aug 07, 2018
View More
flow-image
SilverSky

Navigating the Pitfalls of Attack Prevention

In today’s day of persistent and ongoing targeted attacks, the need to prevent and prepare for the eventuality of a security breach is of paramount importance. More sophisticated threats, including targeted attacks, zero-day attacks and advanced persistent threats (APTs) are more commonplace and becoming harder...

Published: May 30, 2014
View More
flow-image
Symantec

Virtualizing Business Critical Applications with Confidence

Within any business, there are a number of applications that are critical to its success. As a result, these applications and the systems they run on require a higher level of availability. One of the most common methods used to increase the availability of a business-critical application in a physical environment...

Published: Jul 24, 2014
View More
flow-image
Palo Alto Networks

Protect yourself from antivirus

Despite attempts to pivot from outdated security methodologies, legacy antivirus continues to fail in preventing security breaches on the endpoint. Although AV satisfies many regulatory, governance and compliance requirements by layering on multiple products, it saddles organizations with hidden costs while providing questionable...

Published: May 03, 2017
View More
flow-image
Alert Logic

Best practices for today's Log Management Challenges

Log management is an organizational requirement that extends beyond simple data collection. Today's compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.

Published: Jun 12, 2014
View More
flow-image
LogMeIn

Solving the "Password Problem" for Better Security

The 2018 cybersecurity reality is not favorable. The sophistication of cybermiscreants is growing rapidly.  A proliferation of security toolsets to combat the sophisticated cybermiscreants has resulted. The attack surface is larger; there are a growing number of environments and devices to protect as we witness...

Published: Feb 21, 2018
View More
flow-image
Imperva

The Top 10 Database Threats 2015

96% of all records breached are stolen from databases, according to a 2014 Verizon Data Breach Report. Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most.

Published: Feb 01, 2015
View More
flow-image
McAfee

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection.  Often, these advanced...

Published: Sep 18, 2014
View More
flow-image
ESET

Rethinking endpoint and email security for the BYOD era

The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own. In a survey of...

Published: Jul 18, 2013
View More
flow-image
Kaspersky

Build Your IT Security Business Case

At Kaspersky Lab, we know that businesses are under pressure and they all face the same key challenges to stay afloat: they need greater agility, better efficiency and improved productivity. To help meet these challenges, companies are turning to IT to improve processes, deploy and support new systems and technology...

Published: Apr 03, 2014
View More
flow-image
ForeScout

The Cyberthreat Defence Report 2014

Know your enemy! Establishing an effective defensive strategy and understanding cyber criminals attack techniques are crucial with today’s rapidly evolving cyberthreats.   The “2014 Cyberthreat Defense Report” looks to understand those techniques and how IT professionals can defend against them....

Published: Feb 19, 2014
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x