• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Threats & Vulnerabilities
flow-image
Sophos

Protecting your Roaming Workforce with Cloud-Based Security

This paper looks at the security challenges posed by employees working beyond the company's secure perimeter, and proposes a transition to a cloud-based security service.

Published: Apr 21, 2014
View More
flow-image
SafeNet

Securing Sensitive Workloads in the AWS Cloud

Some applications and data require additional security due to rigorous contractual or regulatory requirements. Until now, companies had to store sensitive data (and/or the encryption keys protecting it) in on-premise data centers. Unfortunately, this either prevented migration of these applications to the AWS cloud...

Published: Nov 04, 2013
View More
flow-image
FoxIT

Taming the Beast: SSH for Security and Compliance

SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across almost every enterprise server and PC in your organization. Do you know how your SSH is being controlled? Here are some guidelines for a safer enterprise.

Published: Jun 25, 2014
View More
flow-image
Sophos

Two Great Ways to Protect Virtual Machines From Malware

This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments: agentless scanning using vShield Endpoint and client-based scanning optimized for virtual platforms.

Published: Mar 31, 2014
View More
flow-image
Palo Alto Networks

Securing traditional and cloud-based data centers with next-generation firewalls

Virtualization is helping organizations utilize their data center hardware infrastructure more effectively, leading to reduction in costs, and improvements in operational efficiencies. However, as organizations evolve from traditional data centers to virtualised and cloud computing environments, security architectures...

Published: May 03, 2017
View More
flow-image
Fortinet

Data Center Trends And Network Security Impact

The Data Center is rapidly evolving with recent trends such as Virtualization, Cloud computing, Software Defined Networks (SDN), and Network Function Virtualization (NFV). What are these new technologies and how they impact network security in the data center? This whitepaper covers key concepts and overview of these...

Published: May 28, 2014
View More
flow-image
LogMeIn

Solving the "Password Problem" for Better Security

The 2018 cybersecurity reality is not favorable. The sophistication of cybermiscreants is growing rapidly.  A proliferation of security toolsets to combat the sophisticated cybermiscreants has resulted. The attack surface is larger; there are a growing number of environments and devices to protect as we witness...

Published: Feb 21, 2018
View More
flow-image
SilverSky

Navigating the Pitfalls of Attack Prevention

In today’s day of persistent and ongoing targeted attacks, the need to prevent and prepare for the eventuality of a security breach is of paramount importance. More sophisticated threats, including targeted attacks, zero-day attacks and advanced persistent threats (APTs) are more commonplace and becoming harder...

Published: May 30, 2014
View More
flow-image
Akamai

The 4 Benefits of VPN Elimination

The corporate perimeter as you know it no longer exists. Virtual private network (VPN) vulnerabilities are pervasive, and outdated access solutions are not only cumbersome and time consuming, but also allow for unprotected access to enterprise networks and applications. Management and IT practitioners have long recognized...

Published: Nov 13, 2018
View More
flow-image
Carbon Black

Application Control Observations and Strategies for Success

This white paper, based on experiences gathered from more than 1,000 application control deployments, provides a blueprint that organizations can adopt to help ensure their own successful application control deployment. It also outlines how Carbon Black’s unique trust-based approach and dedicated support of...

Published: Jan 11, 2019
View More
flow-image
Lumension

Endpoint and Mobile Security Buyers Guide

As you move into 2015 endpoint security planning, prioritizing your initiatives can be time consuming. Last year analyst firm, Securosis, offered their thoughts on buying Endpoint Security Management solutions – including patching, configuration, device control and file integrity monitoring – which are increasingly...

Published: May 09, 2013
View More
flow-image
Sophos

Simple Security is Better Security

In this paper we’ll examine the inherent complexity of enterpriseclass security products and the very different needs of smaller organizations. Then we’ll look at a simpler alternative: cloudbased endpoint security.

Published: Apr 21, 2014
View More
flow-image
Symantec Corporation

Protecting Androidâ„¢ Applications with Secure Code Signing Certificates

Symantec Code Signing creates a digital "shrink-wrap" for secure distribution of code and content over the Internet. Symantec Code Signing adds a level of trust by providing third-party authentication of the code signer, recognized worldwide.

Published: Jun 24, 2014
View More
flow-image
Sophos

Sophos Synchronized Security

Advanced malware attacks can cause tremendous damage to an organization, from data loss through compromised identities to operations shutdowns. The cyber-criminals perpetrating these attacks are sophisticated, continuously adapting the latest exploits, and creating new and insidious methods of infiltration and attack....

Published: Jul 08, 2016
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x