White Papers by Topic: Security

Resources available: 390

Gartner: A New Approach to Malware Defense

Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond.

The Bot Threat

Download this whitepaper and learn how bots work and how, by adopting the right strategy, you can use a defense-in-depth strategy to effectively prevent direct attacks against your critical systems.

Why You Need a Next-Generation Firewall

To stay ahead of the threats, it's time for IT to embrace next-generation firewalls

Extend Your Brand and Business with Mobile Applications Powered by API Solutions

Decision makers responsible for mobile strategies are looking for more ways to sell products and services, engage and serve customers, and market via today's hot mobile channel.

IHE and Intel®: Delivering a Foundation for Interoperable Health Information Exchange

Despite the growing prevalence of electronic medical records in healthcare facilities throughout the country, coordination of care among institutions can still be a nightmare. Individual systems are rarely interoperable.

APIs: Prescription for Healthcare Innovation

Learn about four key areas in which APIs and API Management are helping healthcare companies achieve an unprecedented level of technical innovation.

Improve Your Security in 30 Days

This (slightly tongue-in-cheek) white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days.

Magic Quadrant for Intrusion Prevention Systems

The 2013 Gartner Magic Quadrant for Next-Generation Intrusion Prevention System (NGIPS) has been published and HP TippingPoint is in the Leaders Quadrant for the ninth consecutive year.

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

The Bot Threat

Download this whitepaper and learn how bots work and how, by adopting the right strategy, you can use a defense-in-depth strategy to effectively prevent direct attacks against your critical systems.

©1994-2014 Infoworld, Inc.