Security Whitepapers

Sort by: Date | Company | Title

Gigamon Improves Security Visibility With Splunk Enterprise
By Gigamon | 12/7/2017

In a Security Operations Center (SOC), success depends upon the ability to effectively analyze network events for security threats. However, collecting and correlating the right traffic data from across the network can be challenging.

Download this now

Gigamon Transforms Security
By Gigamon | 12/7/2017

This infographic looks at the importance of visibility to networks and examines the need to re-evaluate security strategies to move away from legacy security models. Included is also a FAQ which addresses the basic functions of SDP, who it can help and examples of use cases.

Download this now

Troubling Trends in Network Security
By Gigamon | 12/7/2017

Network security operations are evolving and becoming more difficult to implement. This infographic explains why and the next steps to take.

Download this now

8 Things CIOs Need to know about Whaling
By Mimecast | 16/6/2017

Security is an ever-evolving threat landscape. Even with the best in-breed security systems, there is still a possibility that your company is at risk. This whitepaper covers the 8 important things CIOs need to know about whaling and some useful tips they can use to protect their organisation from being held ransom to such attacks.

Download this now

The Threat Lifecycle Management Framework
By LogRhythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now

CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now

RSA SECURID® SUITE: Accelerate Business While Mitigating Identity Risk
By RSA | 1/3/2017

Introducing the RSA SecurID® Suite, the only identity and access assurance solution that meets the dynamic access needs of today’s modern workforce.

The RSA SecurID Suite offers a comprehensive set of capabilities including access management, authentication, risk analytics, identity governance and life-cycle management.

The RSA SecurID Suite helps solve two fundamental challenges for your organisation. Are my users who they say they are, and do they have the right level of access?

Download this now

Reimagine Your Identity Strategy
By RSA | 1/3/2017

What if imagination and creativity flowed as freely in your business? Unhindered by fear or insecurity, you’d have the courage, ambition and hope to reach new users, deploy new technologies and grow your business faster. You could conquer the world (or at least the marketplace).

Your identity strategy should be the wings that keep your business—and your users—soaring.

Reimagine your identity strategy with the RSA SecurID® Suite, the industry’s most advanced identity and access assurance solution that helps minimise risk and accelerate business. With the RSA SecurID Suite, you’re free to explore a world of limitless possibility.

Download this now

A New Paradigm For Identity Assurance
By RSA | 1/3/2017

The criminals, hacktivists, and others trying to breach corporate cybersecurity are just like anyone else: they want to accomplish their mission as efficiently as possible. So why focus on compromising an organisation's access device or infrastructure? That’s not where the action is.

Advanced threats today target what is on either side of those systems: the user sitting at the keyboard, and the corporate data he or she has access to as part of the job. The goal for the attacker is to compromise identities, impersonate legitimate users to glide past security controls, find valuable data, and glide back out undetected.

Read this whitepaper to find out more.

Download this now

Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It
By Radware | 2/12/2016

"Pay Up or Else." It has become the modus operandi for a new generation of financially motivated cyber assailants. These hackers are leveraging new "pay-for-play" attack tools and services that are available via the Darknet, making ransom cyber-attacks available to even the most novice hackers.

Download Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It, to understand:

• The current threat environment and why ransom attacks are increasing in popularity

• How to differentiate between the real and fake ransom attacks

• Attack tools and services now available to hackers via the Darknet

• The most likely targets of ransom attacks and how to prepare

Download this now

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place