All White Papers

Resources available: 1372

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

Sophisticated exploits that utilize advanced evasion techniques are all too common. Anti-evasion data-normalizing techniques are critical to an effective IPS, since evasions that aren't decoded and detected effectively render the IPS useless.

Anatomy Of A CyberAttack

As the number and severity of cyber-crimes continues to grow, it's important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

Infographic: How SaaS is Fueling Powerful Competitive Advantage

This graphic highlights key points from a global IBM survey of senior decision makers whose organizations have implemented SaaS. Among survey respondents, the Pacesetters are experiencing new, broader benefits resulting in powerful competitive advantage.

Securing the Small Business Network

This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

Achieve Deeper Network Security and Application Control

Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are not effective in today's advanced-threat environment.

Why Threat Intelligence is Critical for Next Generation Firewalls

A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

Infographic: SaaS Takes Center Stage

SaaS continued its impressive growth cycle in 2013, delivering value across the enterprise. Learn how subsricption-based business applications are expected to make an even bigger impact in 2014 and beyond.

Real-world Identity and Access Management for Unix Systems

Unix systems are popular due to their stability and openness. Unfortunately, the very openness of Unix contributes to the challenges users face in identity and access management. This white paper examines these challenges, and how you can overcome them. Download the white paper to learn more.

eBook: IAM for the Real World: Privileged Account Management

Privileged account management (PAM) is the forgotten arm of identity and access management. This e-book provides essential information on the common security issues with PAM, backed by real-world examples. Are you doing enough to manage your privileged accounts? Download the e-book to find out.

Cytori Case Study: Cutting Edge Mobile Device Management

To simplify the administration of wireless voice and data services, Cytori migrated its employees from multiple carriers to a single AT&T wireless plan with attractive rates. In addition, the company deployed MobileIron VSP from AT&T, a part of the Mobile Enterprise Management suite of solutions, to...

©1994-2014 Infoworld, Inc.