Firewall Security Reports

E-Book: Technical Guide on Web Application Firewalls
sponsored by TechTarget Security
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

TechTarget Security

5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
sponsored by Symantec Corporation
WHITE PAPER: Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
Posted: 11 Jun 2009 | Published: 11 Jun 2009

Symantec Corporation

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Closing the Back Door on Network Application Vulnerabilities
sponsored by Sophos
WHITE PAPER: This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Sophos

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

E-Guide: Using web application firewalls to ease compliance efforts
sponsored by TechTarget Security
EGUIDE: When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

TechTarget Security

Expert E-Book: Data Security and the Cloud
sponsored by TechTarget Security
EBOOK: This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

TechTarget Security

Webroot Secure Anywhere - Endpoint Protection
sponsored by OpenText Security Solutions
WHITE PAPER: Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

OpenText Security Solutions

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET