White Papers by Topic: Security

Resources available: 330

Selecting Foundational Controls Makes PCI DSS Compliance Easier

In this Dell Software white paper, learn more about PCI DSS and IT security compliance - straight from an auditor - and discover how you can ensure continuous compliance for your business.

Selecting Foundational Controls Makes SOX Compliance Easier

In this Dell Software white paper, learn more about SOX and IT security compliance - straight from an auditor - and discover how you can ensure continuous compliance for your business.

SANS: Next-Generation Datacenters = Next-Generation Security

This whitepaper takes a look at some new technology that may allow security teams to implement more flexible and capable protection models in virtual and cloud-based datacenters.

SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

SANS review of McAfees Server Security Suite Essentials that address some of the emerging challenges of securing virtual platforms and cloud environments.

Aberdeen: Securing the Evolving Datacenter

This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.

Evolving Your Data Center? Evolve Your Data Center Security

Your datacenter is evolving - your datacenter security should be evolving, too. Key security technologies and services are being adapted by leading solution providers to work across a broad range of physical & virtual datacenter deployment scenarios.

Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques

McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).

The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs)

This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them.

Demand More, Get the Most from the Move to a Next-Generation Firewall

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Augmented VPN

Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.

©1994-2014 Infoworld, Inc.