Security Whitepapers


Sort by: Date | Company | Title


Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It
By Radware | 2/12/2016

"Pay Up or Else." It has become the modus operandi for a new generation of financially motivated cyber assailants. These hackers are leveraging new "pay-for-play" attack tools and services that are available via the Darknet, making ransom cyber-attacks available to even the most novice hackers.

Download Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It, to understand:

• The current threat environment and why ransom attacks are increasing in popularity

• How to differentiate between the real and fake ransom attacks

• Attack tools and services now available to hackers via the Darknet

• The most likely targets of ransom attacks and how to prepare

Download this now


Government agency ensures security of mobile workforce with Blackberry Enterprise service 10
By BlackBerry | 24/11/2016

Due to the sensitive nature of its work, the Australian National Audit Office (ANAO) needed to implement a mobile solution that met its strict security requirements and supported its blended BYOD / COPE policy, while driving enhanced collaboration and productivity through real-time communications amongst its workforce.

Download this now


Government agency ensures security of mobile workforce with Blackberry Enterprise service 10
By BlackBerry | 24/11/2016

Due to the sensitive nature of its work, the Australian National Audit Office (ANAO) needed to implement a mobile solution that met its strict security requirements and supported its blended BYOD / COPE policy, while driving enhanced collaboration and productivity through real-time communications amongst its workforce.

Download this now


Dell EMC Global data protection index II
By Dell EMC | 22/11/2016

Are you protected? Get ahead of the curve with Dell EMC data protection solutions powered by Intel®

Download this now


Gigamon Improves Security Visibility With Splunk Enterprise
By Gigamon | 10/11/2016

Enterprise networks are essential to modern business. Growing numbers of electronic transactions and increasing network speeds means huge amounts of wire data are being created. The challenge SOC teams face when collecting, manipulating, and analyzing this data is how to access it, how to get it into the right tool, and how to handle the immense volumes. They need a way to reduce stream data volume and extract relevant security information so they can quickly zero in on suspicious threats and anomalous behavior and then use the detailed packet data to mitigate and better understand any breach.

Download this now


Automated Traffic Visibility for the Software- Defined Data Center
By Gigamon | 10/11/2016

Using the Software Defined Data Center approach, Gigamon, a leader in traffic visibility solutions and VMware, the leader in server and network virtualization, are extending their joint product offerings to provide pervasive and intelligent visibility into the physical and virtual networks by integrating the Gigamon Visibility Fabric with VMware NSX platform.

Download this now


Stronger Security Without Breaking the Bank
By Gigamon | 8/11/2016

Gigamon commissioned Forrester Consulting to conduct a study in which they interviewed several long-time customers to better understand the benefits, costs and risks associated with a Gigamon implementation.

Download this now


SANS 2015 Analytics and Intelligence Survey
By LogRythm | 2/11/2016

In 2014, security professionals who took the SANS Analytics and Intelligence Survey1 told SANS that they were struggling with visibility into their environments. During that survey period, few organisations were actively leveraging analytics and intelligence tools and services, and even fewer teams had highly or fully automated processes in place for analysing data and producing effective detection and response strategies. Due to their ineffective programs, 24% of respondents also didn’t know whether they had been hacked or not.

Download this now


The Ransomware Threat: A Guide to Detecting an Attack Before it’s Too Late
By LogRhythm | 27/9/2016

This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.

Download this now


Top 5 Steps to Reduce File Data Leakage Risks
By FinalCode | 26/9/2016

Given the necessity of file sharing, respective risks and obligations, and available file protection mechanisms, what is a pragmatic approach for organizations to reduce IP loss, privacy compliance liability and business exposure due to sensitive file data leakage. Here are the top 5 steps that your organization can put in place today.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release