• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Network Security
flow-image
Cradlepoint

Mitigating Security Risks at the Network's Edge

Every year, the public relations specialists from at least one blue-chip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate...

Published: Sep 29, 2014
View More
flow-image
HP

SANS – Survey on Application Security Programs

In today’s security landscape, IPSs are in the process of radical change. Established IPS companies are rapidly improving the look and feel of their IPS devices, making them much more management friendly. IPS inputs were once confined to direct packet capture, but now the packet capture function, while still critical,...

Published: Apr 07, 2014
View More
flow-image
CDW

An Overview of Defense in Depth

Securing your network requires more than just new hardware and software. It’s about a change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords. They have to be aware of every link they click on and every attachment they download. Even the...

Published: Jun 10, 2013
View More
flow-image
ESET

Why Last Year's Security Strategy Can't Protect You From Today's Threats

If you deployed your security solution even just last year, you may not be protected from some of today’s most common malware. Today’s attacks are more frequent, more devious and more targeted, successfully penetrating many businesses that consider their security strategies to be more than adequate.  ...

Published: Jul 18, 2013
View More
flow-image
Palo Alto Networks

Safely Enable Office 365

SaaS applications continue to provide a tremendous value to end users with easy setup and collaboration capabilities that are changing the way organizations do business. The concern over the loss of data leaving the corporate network and opening the network to external threats through unknown collaborators has caused...

Published: Jun 06, 2016
View More
flow-image
Trend Micro

Deep Security and VMware NSX - Defining a Security Framework for the Software Defined Data Center

VMware NSX networking and security platform is a key element of VMware’s vision for the Software Defined Data Center. Trend Micro and VMware are working closely together to develop joint solutions that extend NSX’s core networking and security services with best-ofbreed security deployed with enterprise-class...

Published: Jun 30, 2014
View More
flow-image
Bit9

Java Vulnerabilities Report: Write Once, Own Anywhere

Java was originally released with the slogan “write once, run anywhere,” which was intended to underscore its cross-platform capabilities. Over time, Java has become ubiquitous on endpoints, so “run anywhere” can be interpreted as referring to its ubiquity. Even as fewer websites and Web applications...

Published: Apr 23, 2014
View More
flow-image
EMC

Taking Charge of Security in a Hyperconnected World

Read how organizations can improve breach readiness and cyber security maturity and see recommendations for areas with greatest opportunity for improvement.

Published: May 27, 2014
View More
flow-image
Kaspersky

Why Complexity is IT Security's Worst Enemy

New business processes — and the adoption of new technologies within the workplace — are putting even more pressure on IT resources. The task of securing business data is now much harder and more complex. At the same time, traditional protection tools are no longer adequate to defend businesses against...

Published: Apr 03, 2014
View More
flow-image
McAfee

Counter Stealth Attacks

The Security Connected approach from McAfee helps companies implement layered security controls that block, detect, and defeat stealth attacks. This solution guide provides an overview of the tools and controls that stop stealth attacks in real time; minimize manual correlation and response time; facilitate rapid...

Published: Jun 09, 2014
View More
flow-image
Thawte

The Hidden Costs of Self-Signed SSL Certificates

This paper explores the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration.

Published: Jul 21, 2015
View More
flow-image
Symantec

The Shortcut Guide to Business Security Measures Using SSL

For several years now, Realtime has produced dozens and dozens of high‐quality books that just happen to be delivered in electronic format—at no cost to you, the reader. We’ve made this unique publishing model work through the generous support and cooperation of our sponsors, who agree to bear each book’s...

Published: Sep 23, 2014
View More
flow-image
McAfee

Manage Security and Risk... Get Proactive About Managing Risk

Compliance and financial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept. 

Published: May 29, 2013
View More
flow-image
RSA Security

The Business Case for Evolved SIEM

Looking to buy a SIEM? Then you may be interested in learning about the financial benefits associated with the RSA NetWitness® evolved SIEM.  The Business Case for Evolved SIEM quantifies the potential value companies may realize by deploying the RSA solution. The business case is based on a study of 15 large...

Published: Jan 28, 2019
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x