White Papers by Topic: Security

Resources available: 181

10 Ways to Build a Better Big Data Security Strategy

This IT Manager's Journal will discuss 10 best practices you can employ in your journey down the path of securing Big Data and show how Big Data can be both a problem and a solution.

eBook: Security for a faster world

Business today is driven by a global economy that generates an unprecedented volume and variety of data with alarming velocity. The information in this dossier can help your security team adapt to a world that's evolving faster than ever before

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Not Your Father's IPS: SANS Survey on Network Security Results

This study details a survey of 439 IT security and network professionals conducted by the SANS Institute. It explores use of IPS within respondents' organizations and their plans for future NGIPS. Read the results to learn more.

Why You Need a Next-Generation Firewall

To stay ahead of the threats, it's time for IT to embrace next-generation firewalls

Mobile First: Securing Information Sprawl

Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps and content.

HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time to resolve flagged transactions by 80%.

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight applies these techniques to spot and stop attacks.

10 Ways Wire Data Helps Conquer IT Complexity

This white paper from Slashdot Media explains the value of wire data in practical, simple-to-understand terms.

Data Leakage, Regulatory Compliance & BYOD

Employees use mobile devices in their personal lives because they are easy to use--from anywhere at anytime. Learn more about compliance with HIPAA and other regulations on BYOD.

©1994-2014 Infoworld, Inc.