Security Whitepapers


Sort by: Date | Company | Title


Security Analytics: The Cornerstone Of Modern Detection And Response
By RSA | 5/2/2016

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape.

Download this now


The Retail Guide to Email Fraud
By Return Path | 1/12/2015

The approaching holiday season is one that retailers look forward to all year and 2015 is looking especially profitable. In the US, Deloitte projects that sales will increase four percent over last year’s shopping season, with sales reaching as much as $965 billion between November and January. Around the globe, ecommerce is expected to grow by 25 percent in 2015.

Download this now


Email Threat Intelligence Report
By Return Path | 1/12/2015

mail fraud is on the rise—up more than 162% from 2010-2014. To defend customers, brand reputation, and revenue, organizations around the world are implementing the authentication standard DMARC (Domain-based Authentication Reporting and Conformance) to block bad email before it reaches consumer inboxes.

Download this now


The Online Gaming Guide to Email Fraud
By Return Path | 1/12/2015

There is a lot that online gaming companies are doing to protect against inbound attacks, including data encryption, transaction audits, security architecture protection, and more. But they’re not doing nearly enough to protect the millions of users their business depends on from phishing attacks.

Download this now


THE ANATOMY OF A PHISHING EMAIL
By Return Path | 1/12/2015

Phishing is a type of spam intended to trick email recipients into giving up sensitive information for malicious reasons.

Download this now


Billions of Emails Attributed to Prominent Global Brands Potentially Fraudulent
By Return Path | 1/12/2015

Potentially fraudulent or suspicious messages made up 9% of email in a recent study conducted by Return Path. The examination of more than 200 billion email messages attributed to 157 large global brands between Q4-2014 and Q1-2015 found that most recently, in March, even more --approximately 11% of all messages--did not come from those brands’ known IP addresses and therefore failed DMARC-based authentication checks designed to verify that messages come from legitimate senders.

Download this now


Tenant Traffic Visibility for OpenStack/KVM Powered Clouds
By Gigamon | 23/11/2015

IT organizations and service providers are investing heavily into building open source clouds powered by OpenStack and KVM hypervisor, primarily to reduce licensing costs and to avoid vendor lock-in.

Download this now


End-to-End Visibility for Your Cisco Infrastructure
By Gigamon | 23/11/2015

Across the globe, many companies choose a Cisco networking infrastructure to service their physical and virtual networking needs for enterprise and data center operations. When implementing a large-scale Cisco network, monitoring tools typically rely upon Cisco technologies such as NetFlow, SPAN, RSPAN, ERSPAN, and VACL for traffic visibility. Traffic is extracted and sent to the tools. However, these technologies are often difficult to scale and can modify traffic (e.g. encapsulate traffic) making it difficult to support the diverse monitoring needs of network, security, application, and server groups as they strive to maintain maximized uptime, secure the network, realize operational efficiencies, and gain greater insight into business decision making.

Download this now


Visibility into the Cloud and Virtualized Data Center
By Gigamon | 17/11/2015

IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities. At the same time, it is not unusual for organizations to issue broad mandates to cut back on spending budgets. In these tough times, the adoption of disruptive technologies holds the key to improving efficiency and truly accomplishing more with less.

Download this now


Monitoring, Managing, and Securing SDN Deployments
By Gigamon | 17/11/2015

Mobility, cloud, and consumerization of IT are all major themes playing out in the IT industry today—all of which are fundamentally changing the way we think about managing IT infrastructure. Mobility is driving significant productivity gains. Users, devices and indeed applications are all mobile. Users today access their applications, data, and content from whatever location they are at—be it from the office or from a hotel lobby or from an airport, using whatever device they have at their disposal such as their laptop, smartphone or tablet, and leveraging whatever technology is available—from wired Ethernet, to WiFi to 3G/4G.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place