• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Data Loss Prevention (DLP)
flow-image
Symantec Corporation

Protecting Android™ Applications with Secure Code Signing Certificates

Symantec Code Signing creates a digital "shrink-wrap" for secure distribution of code and content over the Internet. Symantec Code Signing adds a level of trust by providing third-party authentication of the code signer, recognized worldwide.

Published: Jun 24, 2014
View More
flow-image
Carbon Black

Application Control for Dummies

Application control helps you handle the ever-increasing number of threats to computers and devices on a corporate network. As security threats and malware have evolved, so too has the need for technologies like application control. Gone are the days when malware might redirect the user’s search engine. Now,...

Published: Jan 11, 2019
View More
flow-image
FireEye

New Security Challenges for State and Local Governments

In the new era of cyber warfare, states, cities, and towns are directly in the cross hairs. A new breed of cyber attacks is targeting critical infrastructure, key services, and personal data on public employees and citizens. As a result, cyber security has never been so critical for state and local governments. But...

Published: Mar 05, 2014
View More
flow-image
Palo Alto Networks

Data Breaches: Is Prevention Practical?

Data breaches are on the rise. The number of breach notifications issued by the New York State Attorney General’s office, for example, has risen 40% during 2016 compared with the same period a year earlier.  Data breaches are only the tip of the cyber iceberg, however. We trust in and depend on our digital environment,...

Published: Nov 29, 2016
View More
flow-image
A10

Today’s Most Dangerous Security Threats

This paper analyzes the top five most dangerous threats to your data center, namely: DDoS Attacks Web Application Attacks DNS Infrastructure: Attack Target and Collateral Damage SSL-Induced Security Blind Spots Brute Force and Weak Authentication This paper describes the impact of these...

Published: Jun 16, 2015
View More
flow-image
Dell

Why Protection and Performance Matter

Performance and protection go hand-in-hand for Next-Generation Firewalls (NGFWs). Organizations should not have to sacrifice throughput and productivity for security. Outdated firewalls pose a serious security risk to organizations since they fail to inspect data payload of network packets.  Many vendors tout...

Published: Nov 20, 2013
View More
flow-image
A10

Application & Service Delivery Handbook...

The goal of The Handbook is to help Organisations ensure acceptable application and service delivery when faced with both the first generation, as well as the emerging second generation of application and service delivery challenges. Throughout this handbook, the phrase 'ensuring acceptable application and service...

Published: Jun 16, 2015
View More
flow-image
Palo Alto Networks

Securing Your Microsoft Environment

Attackers often gain access to the network by compromising an endpoint -- mobile or otherwise. Whether they steal customer data or become part of a botnet, your organization can't afford to be vulnerable to security incidents. The challenge your organization faces is how to best protect your infrastructure from...

Published: May 03, 2017
View More
flow-image
McAfee

Building a Sustainable Security Operations Model

Get the facts on advanced threat and incident management and learn how McAfee can help your team integrate proactive threat management into your day-to-day security. Download this infographic to learn more! 

Published: Apr 06, 2017
View More
flow-image
McAfee

Security Information and Event Management (SIEM) Orchestration

Cyberattacks are executed in a matter of hours (or less), but studies reveal that the average time companies take to resolve one is 46 days. While this slow response time can be credited to tools that fail to evolve with the threat landscape, today's SIEM can improve situational awareness and orchestrate responses...

Published: Apr 07, 2017
View More
flow-image
Sophos

Synchronized Security; A Revolution in Protection

Complex, threat centric, headcount dependent, myopic solutions will not meet the needs of resource constrained IT security teams. To reverse the trend of increasing incidents and breaches, we must take a much different approach than in the past. Read this whitepaper to learn more and see how synchronized security...

Published: Jul 08, 2016
View More
flow-image
FireEye

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats

Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today’s cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average.  Attacking in multiple stages across multiple vectors,...

Published: Mar 05, 2014
View More
flow-image
Fuze

The Unified Communications Buyer’s Guide to Security & Business Continuity

The decision to invest in new technology should never be taken lightly. From calculating ROI to anticipating and negotiating contracts and changes in infrastructure, there are a multitude of factors to consider when making the transition to a new or upgraded communication service. Yet while financial and...

Published: May 26, 2016
View More
flow-image
Cradlepoint

Mitigating Security Risks at the Network's Edge

Every year, the public relations specialists from at least one blue-chip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate...

Published: Sep 29, 2014
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x