Skip the navigation

Security White Papers

Security white papers and technology resources for implementing and optimizing Security strategy, solutions, Security products, and more.

EndPoint Interactive eGuide

Today's enterprise endpoints are much more diverse and feature-rich than ever before. Employees are making the most of the Bring Your Own Device (BYOD) trend and working whenever, wherever, from the endpoint of their choice. But whether that device is a traditional desktop PC, notebook, handheld device, or tablet, employees are demanding that endpoints offer the rich collaboration and productivity applications required to get their jobs done. And so, while today's highly capable endpoints offer many advantages to employees, they can create new management headaches for IT departments.
In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on how best to manage them. Read on to learn how to make the most of endpoints in your enterprise.

Sponsor: MoreDirect


 

Mobile First: Securing Information Sprawl

Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content - effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps and content.

Sponsor: Box


 

Cybersecurity Imperatives: Reinvent your Network Security

Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.

Sponsor: Palo Alto Networks


 

Surescripts Case Study- Securing Keys and Certificates

Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its healthcare customers, and automate and streamline their processes to reduce the risk of trust based attacks.

Sponsor: Venafi


 

Ponemon 2014 SSH Security Vulnerability Report

Secure shell (SSH) keys are among the fundamental security controls enterprises rely on to protect data and ensure trust. According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks.

Sponsor: Venafi


 

Strategies for Securing Mobile Certificates

Bring Your Own Device (BYOD) has led to a rapid deployment of hundreds of thousands of mobile certificates. Most organizations have no visibility into what users have access to which increases the risk of unauthorized access to critical networks, applications, and data. Learn how to gain control.

Sponsor: Venafi


 

Platfora Big Data Analytics for Network Security

What can be learned from high profile data breaches like Target? The clues may be there, but the volume of data is overwhelming. Learn how you can unlock the value of disparate data types and store event and contextual information for longer period of times, providing a larger event window for analysis which is essential in detecting "low and slow" threats.

Sponsor: Platfora


 

Stop the Top 3 Causes of Data Breaches

Organizations need a new weapon in the ongoing struggle against data breaches. With the patience of today's cybercriminals, it is critical to identify the precursors and indications of malicious activity early on. Learn how to augment your existing security infrastructure by identifying threat activity, watching for "High Value Target" transmission patterns, and monitoring what the bad guys have already learned.

Sponsor: Platfora


 

Automation is Acceleration: Discover the World's Most Powerful DevOps Process Automation Platform

ElectricCommander gives distributed teams shared control and visibility into infrastructure, tool chains and processes. It accelerates and automates the software delivery process to enable agility, predictability and security across many build-test-deploy pipelines. Read on to find out more.

Sponsor: Electric Cloud, Inc.


 

The Elephant Herd in the Room: Why Other Enterprise VoIP Providers Don't Like to Talk About Compliance, Security and Reliability

There's an elephant in the room. A whole herd of elephants, in fact. When it comes to compliance, security and reliability, the silence among VoIP providers is deafening. But there's one VoIP provider that has plenty to say on these topics. Download this white paper and learn:
- New compliance requirements, including HIPAA rules for business
- Security and compliance concerns that should be top of mind
- Availability and reliability metrics that other VoIP providers won't talk about

Sponsor: 8x8, Inc


 

The Elephant Herd in the Room: Why Other Enterprise VoIP Providers Don't Like to Talk About Compliance, Security and Reliability

There's an elephant in the room. A whole herd of elephants, in fact. When it comes to compliance, security and reliability, the silence among VoIP providers is deafening. But there's one VoIP provider that has plenty to say on these topics. Download this white paper and learn:
- New compliance requirements, including HIPAA rules for business
- Security and compliance concerns that should be top of mind
- Availability and reliability metrics that other VoIP providers won't talk about

Sponsor: 8x8, Inc


 

The Total Cost of Email

The vital demands for enhanced archiving, security and continuity in your email environment can quickly escalate the costs of your in-house email management strategy. In this white paper, we'll explore the true costs of fragmented email management and uncover how to reduce those costs with a cloud-based solution for email management.

Use this resource to help you calculate the TCO of your email environment and determine the advantages cloud services could provide to you.

Sponsor: Mimecast


 

Balancing Security, Compliance and Cost: the Prescription for Healthcare Email Management: Move to the Cloud

Learn how cloud-based technologies for core productivity tools such as email and collaboration can help healthcare organizations be more efficient with IT dollars and focus on strategic initiatives such as the EMR.

Sponsor: Mimecast


 

Email Security Checklist: Eight Steps for Healthcare Organizations

Don't let fear of violating Healthcare Insurance Portability and Accountability Act (HIPAA) codes prevent you from using email to communicate sensitive information. Email is powerful and can improve efficiency and satisfaction with patients and partners. It can also help you better manage information that flows through your organization as well as make it more accessible.

Sponsor: Mimecast


 

Mobile Policy Checklist

Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.

Sponsor: CDW


 

Securing BYOD

Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are responding to the capabilities and flexibility that mobile devices provide.

There is no silver bullet that is the be-all, end-all answer to BYOD security. The solution that works best for any particular organization is unique, tailored to that entity's requirements, technologies and environments.

Sponsor: CDW


 

The Threat Landscape

Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks? Download Kaspersky's Guide to the Threat Landscape to learn more.

Sponsor: Kaspersky


 

Be the One Who Puts Security on the Agenda eBook

You want to maximize the potential offered by new technologies and establish an advantage over your competitors. But you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives.

Sponsor: Kaspersky


 

Virtualization Best Practices Guide

Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department's efforts to do more with less. Whether you're running applications on physical or virtual machines, you still need to stay vigilant to guard against the hazard of malware and other cyberthreats.

Sponsor: Kaspersky


 

Mapping Organizational Roles & Responsibilities for Social Media Risk

Social media has introduced a wide array of opportunities for organizations to engage with customers, employees and partners. But with these opportunities come risks. What is less clear is who is responsible for managing and mitigating the risks tied to social media.

Sponsor: HootSuite Media, Inc.