Security Threat Management Reports

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies

Botnets: The dark side of cloud computing
sponsored by Sophos
WHITE PAPER: Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos

Layered Security: Protecting Your Data in Today's Threat Landscape
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Tripwire, Inc.

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Trend Micro, Inc.

Next-generation firewalls are mainstream: What to expect
sponsored by Palo Alto Networks
EGUIDE: Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.
Posted: 19 Mar 2012 | Published: 15 Mar 2012

Palo Alto Networks

The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE: This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009

SonicWALL

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

E-Guide: IT Security and Defence Strategies
sponsored by Kaseya International Limited
EGUIDE: With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Kaseya International Limited