Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:Websense, Inc.

  • Use Case: Secure Internet Access for 71,000 Australian Students

    This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.

  • Exposing the Cybersecurity Cracks: Australia

    The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.

  • Exposing the Cybersecurity Cracks: A Global Perspective

    This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.

  • Competitive Testing of Web Security Devices

    This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.

  • Websense 2014 Threat Report, Websense Security Labs

    In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.

  • Preventing Malware Attacks

    As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware.

  • Next-Generation Secure Web Gateways:The Case and Criteria for Embedded DLP with Advanced Malware Defenses

    While the Web has become a core business communication platform, it’s also a highly popular target for cybercriminals and hackers. This resource explores how to mitigate the risk of data loss over Web channels, uncovering the business need for DLP as part of Web Security Gateways and the key criteria to consider when choosing a solution.

  • Websense TRITON Mobile Security

    When it comes to mobile security, the biggest concern isn’t the mobile device itself – it’s the data; so it’s important to implement the most effective measures to fend off mobile threats. In this brief resource, explore how Triton Mobile Security combines four (4) key elements to enable highly effective unified mobile security.

  • Ponemon Global Study on Mobility Risks

    With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them.

  • Understanding the Reasons Behind Data Loss Disasters

    While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.

  • Security Predictions for 2012

    This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon.

  • What Security Threats Can We Expect in 2012?

    View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.

  • Security Predictions for 2012

    With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.

  • Technical Guide on Collaboration Threat Vectors

    Techtarget's Security Media Group presents a comprehensive guide to securing collaboration technologies. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype.

  • Advanced Persistent Threats: From “FUD” to Facts

    What is Advanced Persistent Threat (APT)? Too much marketing hype and FUD (fear, uncertainty, and doubt) have clouded the facts about a very real danger to organizations of all sizes. View this paper to gain a better understanding of APT and how to mitigate your risks. 

  • Selecting the right DLP solution: Enterprise, Lite, or Channel?

    DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.

  • Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations

    Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.

  • Shutting the Door on Data Theft

    Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you.

  • Evolving IT security threats: Inside Web-based, social engineering attacks

    In order to adequately defend IT infrastructure, organizations must have a solid understanding of the various attack methods that are effective today. This expert e-guide takes an in-depth look into the latest IT security threats and provides strategic recommendations on how to deal with them.

  • Three Must-Have’s to Securing the Social Web

    Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.

  • Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk

    Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.

  • A Buyer's Guide to Data Loss Protection Solutions

    Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution.

  • Unified Content Security in Practice

    Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention.

  • The Need for Unified Content Security

    Part 1 of a three-part series, this paper elaborates on the business and technology conditions that have given rise to the need for a unified content security solution.It also includes a high-level functional description and summary of benefits for such a solution.

  • Web Security Gateway: Web 2.0 Secured and Simplified

    The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.