Security Whitepapers


Sort by: Date | Company | Title


SECURITY, DURABILITY AND USABILITY TARGET HP’S FLAGSHIP CONVERTIBLE AT BUSINESS USERS
By HP | 26/4/2016

Computer vendors have carefully straddled the line between laptop and tablet, distributing features in both directionsas end-user demand transitions from one form factor to the other. Recent consolidation around convertible devices, which combine both form factors into a single coherent unit, has turbocharged the tablet into a productivity tool that is gaining currency amongst business users whose primary needs include productivity tools and access to cloud services.

Download this now


Detecting a Phising Email
By LogRhythm | 19/4/2016

It is critical to take proactive measures to protect yourself and your organisation’s security. Being vigilant and educating staff on the potential dangers of phising emails is a critical step in protection. This infographic illustrates the 10 things you need to know spot and handle phising email.

Download this now


Anatomy of a Hack Disrupted
By LogRhythm | 19/4/2016

With malware threats growing larger and more challenging to cope with each year, organisations can no longer rely on signature-based scanning of machines to identify these threats. Find out in this whitepaper how a comprehensive approach can ensure threats are automatically detected, isolated, identified, and disrupted well before any damage can be done.

Download this now


Responding to Today’s Advanced Threats
By LogRhythm | 19/4/2016

True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. Find out in this product review how you can get visibility to detect threats to the organization and responding to them in a timely fashion.

Download this now


Active Visibility for Multi-Tiered Security
By Gigamon | 7/4/2016

The changing threat landscape and evolving network infrastructure are forcing organisations to rethink their approach to security. The ability to scrutinise through the deluge of Big Data from across the network in real time is vital to identifying and mitigating today’s and tomorrow’s threats.

The Gigamon Visibility Fabric provides the platform for end-to-end visibility coupled with traffic intelligence that is needed to efficiently manage risks and address threats in this ever evolving threat and network environment.

Download this now


Gigamon Transforms Security for Government
By Gigamon | 7/4/2016

With government hacks and security breaches skyrocketing, the federal sector has proven to be a prime target for malicious and covert cyber attacks. While many security, performance, forensics, and analyser tools are available, they are only as effective as the communications and network traffic they can see.

The key to identifying and combating breaches is network visibility. Gigamon understands the importance of network visibility—bridging the technology of the past with the architecture of the future. As the leader in traffic visibility solutions, Gigamon provides pervasive and continuous visibility across all network traffic.

Download this now


Case Study: University of Glasgow Scales its Intrusion Detection System to Support 30,000 users
By Gigamon | 7/4/2016

The University of Glasgow needed to scale its IDS platform to secure its 30,000 users, who were generating tens of gigabits of internet traffic. Port mirroring was limited by a single interface on the router and load balancing was needed across multiple IDS servers. A Gigamon solution using G-TAP optical splitters, the GigaVUE-HB1 Visibility Fabric™ node, and patented Flow Mapping® technology.

The benefits were being able to monitor all of the traffic coming across its 10Gb internet links; Detect compromised PC’s before damage is done - helping identify users with a virus and taking remedial action; Operate its IDS systems on a cluster of commodity servers, saving cost and repurpose existing network monitoring and measuring equipment.

Download this now


Security Analytics: The Cornerstone Of Modern Detection And Response
By RSA | 5/2/2016

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape.

Download this now


The Retail Guide to Email Fraud
By Return Path | 1/12/2015

The approaching holiday season is one that retailers look forward to all year and 2015 is looking especially profitable. In the US, Deloitte projects that sales will increase four percent over last year’s shopping season, with sales reaching as much as $965 billion between November and January. Around the globe, ecommerce is expected to grow by 25 percent in 2015.

Download this now


Email Threat Intelligence Report
By Return Path | 1/12/2015

mail fraud is on the rise—up more than 162% from 2010-2014. To defend customers, brand reputation, and revenue, organizations around the world are implementing the authentication standard DMARC (Domain-based Authentication Reporting and Conformance) to block bad email before it reaches consumer inboxes.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place