• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Disaster Recovery
flow-image
FireEye

The Numbers Game: How Many Alerts is too Many to Handle?

In a recent analysis of threat management, FireEye learned that large enterprise companies rely on security personnel to fulfill multiple roles and responsibilities – an expectation that can prove disastrous when it comes to finding and escalating a critical alert. This special report is based on a worldwide...

Published: Jan 29, 2016
View More
flow-image
EMC

Solution Brief: Implementing a Security Analytics Architecture

New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.

Published: Mar 20, 2014
View More
flow-image
Palo Alto Networks

Cybersecurity Buyer's Guide

What 10 things must your next cybersecurity solution do? In this comprehensive guide, you'll discover recommended criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats. Access it now to learn how to effectively evaluate cybersecurity solutions through...

Published: May 03, 2017
View More
flow-image
Comodo

Endpoint Security and the Case for Automated Sandboxing

We live in a world of constant threat. Every hour of every day in every country around the globe hackers are working feverishly, attacking both large and mid-sized companies across every industry and region, writing malicious code to exploit your website and computer network. Every computer, laptop, tablet and mobile...

Published: Aug 20, 2013
View More
flow-image
Kaspersky

Why Complexity is IT Security's Worst Enemy

New business processes — and the adoption of new technologies within the workplace — are putting even more pressure on IT resources. The task of securing business data is now much harder and more complex. At the same time, traditional protection tools are no longer adequate to defend businesses against...

Published: Apr 03, 2014
View More
flow-image
McAfee

The Big Security Data Challenge - Make SIEM work for you

Technology today has become synonymous with data. As each new tool enters the enterprise, the shear volume of information IT organizations deal with compounds. Gartner estimates the amount of data analyzed by enterprise information security organizations will double every year through 2016. 

Published: May 14, 2013
View More
flow-image
HP

The Bot Threat; HP Whitepaper

Today enterprise networks can be attacked in a number of ways. None are more daunting than the Internet robot or simply, the bot. Bots are malicious code programs that are automated to infect a computer network. They can strike in so many different ways that traditional network security is often ineffective in blocking...

Published: Aug 25, 2014
View More
flow-image
Carbon Black

SANS Evaluator’s Guide to Cloud-Based NGAV

Legacy antivirus does not stop the malware and non-malware attacks companies face every day, so customers are looking for next-generation antivirus (NGAV) products that will. Yet with all these new technologies, many are confused about what they should be looking for. In this guide by SANS, a trusted (and...

Published: Jan 11, 2019
View More
flow-image
ESET

Six Months with Windows® 8

Microsoft® Windows 8 has just reached its six-month anniversary 1 , and we at ESET® thought now would be a good time to review where things stand with the latest incarnation of Microsoft’s flagship operating system. Last year, ESET took an in-depth look at Windows 8’s security, examining many of...

Published: Jun 24, 2013
View More
flow-image
Cylance

Endpoint security isn’t dead – it’s just getting smarter

With one report after another suggesting that cybercriminals have overrun corporate defences, it’s easy to believe marketing hype suggesting that endpoint security is dead – and that cybersecurity is all about how quickly you can respond to the inevitable breach. Yet a new Cylance survey of iTnews readers...

Published: Mar 21, 2019
View More
flow-image
Damballa

Learn the Shortfalls of Security Sandboxing and Virtual Execution

With the decreasing effectiveness of prevention suites, information security professionals are turning to alternative approaches to detecting the presence of advanced malware. The approach seems logical on the surface – “detonating” malware to capture communication traits and endpoint forensics seems...

Published: Apr 14, 2014
View More
flow-image
Cradlepoint

Mitigating Security Risks at the Network's Edge

Every year, the public relations specialists from at least one blue-chip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate...

Published: Sep 29, 2014
View More
flow-image
Palo Alto Networks

User-ID

User and group information must be directly integrated into the technology platforms that secure modern organizations. Knowing who is using the applications on your network, and who may have transmitted a threat or is transferring files, strengthens security policies and reduces incident response times. User-ID, a...

Published: May 03, 2017
View More
flow-image
Akamai

Is DNS Your Security Achilles Heel?

Despite the many layers of security most companies implement, there is still one vulnerability that is often left unprotected: the Domain Name System or DNS. This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you...

Published: Jun 12, 2018
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x