Corporate Partners

Security Whitepapers


Sort by: Date | Company | Title


Security intelligence: solving the puzzle for actionable insight
By LogRhythm | 16/6/2015
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent. Rather, organisations should work on the principle that it is probable that they have already been breached. Traditionally, many security technologies have focussed on preventing threats from penetrating their networks, but, faced with increasingly sophisticated, well resourced, and businesslike attackers with the ability to target specific individuals and organisations with tailor-made exploits and to evade such defences, such tools are no longer sufficient. Prevention alone is not enough.
Download this now


LogRhythm and Symantec: Symantec Security Information Manager (SSIM) Migration Program
By LogRhythm | 16/6/2015
Following Symantec’s end-of-sale announcement for Symantec Security Information Manager (SSIM), customers are looking for alternative solutions to meet their SIEM needs. For customers that want or require an on-premise solution, LogRhythm has developed a simple and efficient migration path from SSIM to LogRhythm’s best-inclass Security Analytics and Intelligence Platform.
Download this now


Password Hygiene: a security mandate, not a best practice
By LogRhythm | 16/6/2015
This infographic looks at the findings from research capturing the password hygiene trends and how employees are placing organisations at risk.
Download this now


Surfacing critical cyber threats through security intelligence
By LogRhythm | 16/6/2015
As organizations evolve their Security Intelligence maturity, the realized reduction in MTTD and MTTR significantly reduces the risk of experiencing a damaging cyber incident. Of course, each organisation needs to assess for itself the appropriate level of maturity based on its own risk tolerances.
Download this now


The cyber threat risk - oversight guidance for CEOs and boards
By LogRhythm | 16/6/2015
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Download this now


With honeypots and threat intelligence ecosystems, LogRhythm expands capabilities
By LogRhythm | 16/6/2015
Security information and event management (SIEM) products provide a plethora of data that can be enriched to the nth degree. However, this data is of little value unless it can be converted into meaningful information that organizations can use to proactively detect and respond to threats in an acceptable timeframe.
Download this now


The state of application delivery in 2015 report
By F5 Networks | 17/4/2015
F5 surveyed customers from more than 300 organisations across a broad spectrum of vertical markets such as banking and finance, telecommunications, public sector, and consumer products.
Download this now


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015
Information on the security threat “Shellshock” and its mitigation.
Download this now


An evolving threat needs and evolved defense
By F5 Networks | 17/4/2015
Secure your business from today's sophisticated attacks.
Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place