Skip the navigation

Security White Papers

Security white papers and technology resources for implementing and optimizing Security strategy, solutions, Security products, and more.

Neustar 2014 DDoS Attacks and Impact Report

For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Read the full report to learn more.

Sponsor: Neustar Inc.


 

Acxiom Case Study

This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity with the CommVault Edge software.

Sponsor: CommVault


 

Windows® XP Migration: Protect and Secure Critical Data

With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate to a newer operating system or to continue with XP without continuing security updates. This solution brief discusses how CommVault Simpana software can help business protect and secure data, whether a company is looking to migrate or stick with Windows XP.

Sponsor: CommVault


 

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management

Massive data growth and shrinking application recovery windows are creating a huge challenge for IT administrators. Legacy backup models can't cope with multi-terabyte applications. However, by leveraging a modern approach to data protection that uses your current disk array snapshot technology, you can leave your recovery problems behind.  This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.

Sponsor: CommVault


 

Radicati: Cloud Business Email - Market Quadrant 2013

Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google Apps for Business leads the pack in both functionality and estimated adoption.

Sponsor: Google Apps


 

Tablets in the Enterprise: A Checklist for Successful Deployment

Roughly 98% of Fortune 500 companies are currently using or supporting iPads in their organizations. If the most powerful companies in the world are on the tablet bandwagon, it's only a matter of time before tablets become integral to the way we work. Employees are choosing iPads and other tablets to enhance their productivity and for the flexibility to work anywhere, anytime.

So, how can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees need to work? Read on.

Sponsor: Code42


 

Enterprise Mobility: A Checklist for Secure Containerization

The mobilization of a workforce creates ongoing challenges for enterprise IT teams charged with security and
compliance of critical corporate data on employee-owned devices. Happily, some of these challenges can be
resolved through implementation of a multi-layered, enterprise mobility management (EMM) strategy. One
EMM component to consider is containerization-a security method that separates enterprise applications
and data from personal applications and data.

Following is an overview of the multiple approaches to containerization, including the pros and cons of each.

Sponsor: Code42


 

Enterprise File Sync & Share Checklist

File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP sites, unreliable remote server access and VPNs. Instead employees can work seamlessly from anywhere. This flexibility has become increasingly important--and expected--with IT consumerization, BYOD and daily use of multiple devices for work. But, not all file sync and share platforms are created equally.

While consumer-grade sync and share platforms are easy to use, they also have limitations. Many are only accessible through apps or web browsers, have storage limits and provide only email-based support. Additionally, consumer-grade platforms often lack the level of data encryption, security and integration required for enterprise IT to fully secure and protect data moving into and out of their networks. Review this checklist for must-have guidelines and considerations for selecting an enterprise-ready file sync and share that provides IT with complete visibility and control, while allowing users to just keep working.

Sponsor: Code42


 

Enterprise Endpoint Backup Checklist

Let's face it, users store business data on laptops and desktops, even if they're not supposed to. And mission-critical data-including sensitive, executive-level information-exists exclusively on these endpoint devices. IT organizations unprepared to provide easy-to-use, easy-to-administer, cross-platform endpoint backup and restore are at risk for needless data loss and IT management nightmares. Read this checklist to learn how to create a back up strategy to quickly and easily protect your endpoint data.

Sponsor: Code42


 

Enterprise Security Checklist

Don't be a target! With the onset of BYOD and IT consumerization, threats to your network security and sensitive corporate information are very real. But there are simple steps you can start implementing today to safeguard your IT environment against these increasing security threats by cybercriminals. Read this checklist to increase your security and update your processes for protection today.

Sponsor: Code42


 

5 Impactful Tips for Securing BYOD in the Enterprise

Allowing employees to use their personal devices for work provides flexibility, convenience and ease-of-use benefits that enhance their productivity and overall work experience. However, bring-your-own-device (BYOD) policies can pose security challenges to your enterprise environment. IT must monitor and control which devices are brought into the enterprise and implement a security strategy that can aid in the management of these devices.

Sponsor: Code42


 

CrashPlan PROe Security

CrashPlan PROe is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops often are connected to unsecured networks, a very high standard of security is required to ensure privacy.

Sponsor: Code42


 

SharePlan Security

SharePlan is a continuous, secure, enterprise-ready file sync and share platform that facilitates smart, real-time collaboration across all devices. Because laptops and mobile devices often are connected to unsecured networks, a very high standard of security is required to ensure privacy.

Sponsor: Code42


 

Leveraging Endpoint Backup for Legal Holds & E-Discovery

As the volume, mobility and compliance requirements of enterprise data explodes, so has the need to collect and preserve data for the purpose of e-discovery. Learn how enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.

Sponsor: Code42


 

Binary Option: Neustar SiteProtect Case Study

Learn how Neustar helped Top10optionbinaire.com protect against DDoS attacks with SiteProtect DDoS mitigation technology.

Sponsor: Neustar Inc.


 

Four Ways DNS Can Accelerate Business Growth

This DNS eBook describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats.

Sponsor: Neustar Inc.


 

Three Ways Your DNS Can Impact DDoS Attacks

Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.

Sponsor: Neustar Inc.


 

The Winter Games - Your Way

During the 2014 Winter Olympics, video streams from the Akamai network reached devices internationally. Learn how Akamai provided stream security and analytics capabilities 24/7, and find out about key statistics that Akamai collected. Read this blog for a window into understanding the true freedom that a quality online experience unlocks.

Sponsor: Akamai Technologies, Inc.


 

Who's Spying on You?

You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Download this report to learn more.

Sponsor: Kaspersky


 

The Threat Landscape

Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks? Download Kaspersky's Guide to the Threat Landscape to learn more.

Sponsor: Kaspersky