White Papers by Topic: Security

Resources available: 312

Advanced Threat Defense: A Comprehensive Approach

In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive approach to network advanced threat defense.

EndPoint Interactive eGuide

In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on how best to manage them. Read on to learn how to make the most of endpoints in your enterprise.

A More Predictable Way to Budget Software Costs

Wavetronix enables creative collaboration while cost-effectively accessing all the latest tools with Adobe Creative Cloud for teams. For Wavetronix, collaboration was easy when its marketing team was small and everyone worked in the same office.

Adobe Creative Cloud for teams Security Overview

This white paper describes the proactive approach and procedures implemented by Adobe to increase the security of your Creative Cloud experience and your data.

Surescripts Case Study- Securing Keys and Certificates

Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its healthcare customers.

Ponemon 2014 SSH Security Vulnerability Report

According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks.

Strategies for Securing Mobile Certificates

Most organizations have no visibility into what users have access to which increases the risk of unauthorized access to critical networks, applications, and data. Learn how to gain control.

Platfora Big Data Analytics for Network Security

Platfora amplifies the effectiveness of network security analysis, providing Big Data Analytics capability to augment existing security infrastructure for known threats, and advanced analytics capability to identify new threats.

Stop the Top 3 Causes of Data Breaches

Around the world, enterprises and public agencies store massive amounts of data: customer data, internal corporate data, and intellectual property, making it the lifeblood of the business.

The Elephant Herd in the Room: Why Other Enterprise VoIP Providers Don't Like to Talk About Compliance, Security and Reliability

There's an elephant in the room. A whole herd of elephants, in fact. When it comes to compliance, security and reliability, the silence among VoIP providers is deafening. But there's one VoIP provider that has plenty to say on these topics.

©1994-2014 Infoworld, Inc.