Corporate Partners

Security Whitepapers


Sort by: Date | Company | Title


LogRhythm placed in leaders quadrant of 2014 Gartner SIEM Survey
By LogRhythm | 20/10/2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics.
Download this now


Mobile Workspaces: Protect critical business information while embracing mobility
By Citrix Online | 15/10/2014
How does an IT organization craft a mobility strategy that improves productivity and flexibility for people who work from anywhere, while also meeting the ever-increasing security demands of the business?
Download this now


Mitigating Multiple DDoS Attack Vectors : Infographic
By F5 Networks | 1/10/2014
Security professionals need to know how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.
Download this now


Getting Started With a Zero Trust Approach to Network Security
By Palo Alto Networks | 16/7/2014
Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust architecture.
Download this now


Cybersecurity Imperatives: Reinvent your Network Security
By Palo Alto Networks | 16/7/2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.
Download this now


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 16/7/2014
For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.
Download this now


Security and Speed
By F5 Networks | 16/7/2014
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.
Download this now


Key Communications Systems Are Always Available, Highly Responsive for Global Mining Company
By F5 Networks | 16/7/2014
Mining company Teck Resources wanted to ensure high availability and responsiveness for its critical employee communications systems. To achieve this goal, Teck chose a comprehensive F5 traffic management and secure access solution that provides high availability and give users a more responsive experience.
Download this now


Protecting Against Application DDoS Attacks : A Three-Step Solution
By F5 Networks | 16/7/2014
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
Download this now


DDoS Protection: Recommended Practices
By F5 Networks | 16/7/2014
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place