• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Log Management
flow-image
Carbon Black

10 Endpoint Security Problems Solved By The Cloud Infrographic

The three challenges you’re likely facing – cost and complexity, defenses that can’t keep up, and overburdened staff – drive ten real and tangible problems that require lots of time and resources. Endpoint security is a challenge. Defenses aren’t keeping up, and security staff is stretched...

Published: Jan 11, 2019
View More
flow-image
Venafi

Gartner: Responding to New SSL Threats Report

Global enterprises have a gaping hole in their security strategy for defending against rampant cyber attacks on the trust established by cryptographic keys and digital certificates. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot...

Published: Jul 01, 2014
View More
flow-image
Palo Alto Networks

How to Secure your Network from Ransomware

Although endpoints are typically the targets, ransomware can spread rapidly across a network in spite of layers of security and impact the entire organisation. Ransomware threatens to derail network operations teams’ efforts to ensure optimal performance and security. The cost to an organisation can be significant...

Published: Feb 12, 2018
View More
flow-image
IBM

Avoiding insider threats to enterprise security

Today’s organizations are highly vulnerable to security threats related to privileged identities—that is, the accounts of system administrators, database managers and others with elevated access to critical IT resources. Because of the overarching access of these users, their privileged identities have...

Published: Sep 11, 2013
View More
flow-image
Intel Security

Network Performance and Security

In recent years, the network firewall has evolved from a relatively simple security appliance to assume a prominent role in the enterprise’s cybercrime defenses. Next-generation firewalls (NGFWs) represent the state of the art, incorporating features such as intrusion prevention, anti-malware, and deep packet inspection...

Published: Apr 27, 2015
View More
flow-image
Intel Security

Calculating the Business Value of Next Generation Firewall

This white paper articulates the business benefits derived by companies that have deployed NGFW. The data is based on in–depth interviews with eight McAfee customers. These companies were mostly large organizations with an average employee base of 7,082. Interviewees came from a variety of industries — energy,...

Published: Apr 27, 2015
View More
flow-image
McAfee

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager

Many organizations today are using security event management tools to gather, correlate and report on security data within their environments. Although some are still using traditional log management tools, the need for more effective event intelligence and deeper analysis of activity within the environment is driving...

Published: Apr 16, 2014
View More
flow-image
Thawte

Fraud Alert: New Phishing Tactics - and How They Impact Your Business

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers. 

Published: Oct 14, 2014
View More
flow-image
FireEye

The Numbers Game: How Many Alerts is too Many to Handle?

In a recent analysis of threat management, FireEye learned that large enterprise companies rely on security personnel to fulfill multiple roles and responsibilities – an expectation that can prove disastrous when it comes to finding and escalating a critical alert. This special report is based on a worldwide...

Published: Jan 29, 2016
View More
flow-image
Citrix

A Foundation for Next-Generation Datacenter Security

The need for robust datacenter security has never been greater. Traditional challenges and concerns—including extensive regulatory requirements, the rise of targeted attacks, and the continuing erosion of perimeter-centric security models—are now being joined by the need to account for highly dynamic enterprise...

Published: May 08, 2014
View More
flow-image
CA Technologies

Defending Against Insider Threats in the 'Snowden Era'

Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets. Learn new insights into insider threats and how you can use Privileged Identity Management and Data Protection capabilities to help...

Published: Jan 06, 2014
View More
flow-image
Qualys

Best Practices for Selecting a Web Application Scanning Solution

This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.

Published: Apr 24, 2014
View More
flow-image
Palo Alto Networks

Securing traditional and cloud-based data centers with next-generation firewalls

Virtualization is helping organizations utilize their data center hardware infrastructure more effectively, leading to reduction in costs, and improvements in operational efficiencies. However, as organizations evolve from traditional data centers to virtualised and cloud computing environments, security architectures...

Published: May 03, 2017
View More
flow-image
Qualys

Vulnerability Management for Dummies

If you are responsible for network security, you need to understand how to prevent attacks by eliminating network weaknesses that leave your business exposed and at risk.  Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this newly revised, 6-part...

Published: Aug 08, 2014
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x