Security Software Reports

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Lumension

How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY: Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Lumension

PassMark Report: Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec Corporation
ANALYST REPORT: This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.
Posted: 29 Jul 2013 | Published: 30 Nov 2012

Symantec Corporation

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by TechTarget Security
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

TechTarget Security

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

Panda Cloud Systems Management: Reports Datasheet
sponsored by Panda Security
WHITE PAPER: This crucial paper examines a cloud-based IT management solution that provides detailed and measurable reports to justify time spent and show all of the actions you have taking remotely preventing and managing problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Best Practices for Improving Mobile Data Security
sponsored by TechTarget Security
EGUIDE: This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

TechTarget Security

Panda Cloud Systems Management: Management Datasheet
sponsored by Panda Security
WHITE PAPER: Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Panda Security

Panda Security and Delta Wines - Case Study
sponsored by Panda Security
CASE STUDY: Read about a wine trading company which was able to use a remote monitoring and management tool to perform diagnoses and resolve incidents non-intrusively and on-demand, helping to get through the approximately 2500 updates that had previously piled up.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Panda Security

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

Panda Security and Minopex - Case Study
sponsored by Panda Security
CASE STUDY: Learn how a mining organization was able to integrate a cloud systems management tool into their existing security solutions to streamline audits, make diagnoses and resolve incidents wherever they are and whenever they arise.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

Panda Security

Rethink Defense-In-Depth Security Model For BYOD
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

TechTarget Security

Shift Your Thinking on Endpoint Protection
sponsored by CenterBeam
EGUIDE: In this e-guide, SearchSecurity.com experts explain the state of endpoint security and why it's time to change our endpoint protection approach. View now to learn more.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

CenterBeam

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by TechTarget Security
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

TechTarget Security

Malware Attacks Demand a New Malware Defense Approach
sponsored by TechTarget Security
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
sponsored by OpenText Security Solutions
WHITE PAPER: This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

OpenText Security Solutions

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by OpenText Security Solutions
WHITE PAPER: This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013

OpenText Security Solutions

Five Security Considerations for the Mobile Age
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Case Study - System One
sponsored by OpenText Security Solutions
CASE STUDY: This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013

OpenText Security Solutions