• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Lang: CN | EN
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Symantec

Unified Data Protection for Physical and Virtual Environments

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges...

View More
flow-image
VMware

SD-WAN for Financial Institutions

Financial services enterprises adopt SD-WAN to achieve bandwidth expansion, optimize connectivity to cloud resources and more. Get the details. 

View More
flow-image
Proofpoint

Driving Real Behaviour Change

Starting a new training programme may seem daunting. Maintaining one that keeps your users engaged, changes their behaviour and reduces your organisation’s exposure to threats might be an even bigger challenge. This guide shows you how to create and sustain an efficient and effective cybersecurity education...

Published: Apr 21, 2021
View More
flow-image
LogRhythm

Surfacing Critical Cyber Threats Through Security Intelligence

The significant and successful cyber events of 2014 might well prove to be the cyber tipping point, where businesses and governments together finally acknowledge the fragility of their enterprises, the grave threat to national and economic security, and the need for executive-level oversight....

View More
flow-image
Arbor Networks

Cloud Computing: Ensuring Availability for One and All

With cloud computing's paradigm of shared infrastructure, DDoS attacks on a specific target can quickly affect many or all tenants. In this Arbor Insight, we explain why availability should be the top priority for cloud operators, and outlines best current practices for preventing and mitigating attacks.

View More
flow-image
Symantec

2013 Cost of Data Breach Study: Global Analysis

The report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response. We also analyze the economic impact of lost or diminished customer trust and confidence as measured by customer turnover or churn.

View More
flow-image
GeoTrust

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

In this guide, you’ll learn more about phishing, why it has become such a widespread problem, and the negative impact that a phishing attack can have on your company and your customers. You’ll also learn how SSL and EV SSL technology can help protect your web site, your business, and ultimately your bottom...

View More
flow-image
Centrify

Top 3 Reasons to Give Insiders a Unified Identity

Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. Forbes recently cited  internal threats  as the third most significant cyber-security threat for 2013. The...

View More
flow-image
Imperva

DDoS Response Playbook

This handbook provides you with a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for...

View More
flow-image
SilverSky

The Right Way to do Exchange in the Cloud

In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

View More
flow-image
Carbon Black

Endpoint Protection and Response: A SANS Survey

The SANS 2018 Endpoint Security Survey, conducted by SANS in association with the SANS DFIR Summit, revists threats, protections, and response capabilities on the endpoint. For this report, SANS surveyed 277 IT security professionals in March and April 2018 using a 30-question survey to learn about their experiences...

View More
flow-image
McAfee

McAfee Real Time Command

McAfee® Real Time Command is the first and only solution that allows you to query and control all of your enterprise assets in seconds, so you can identify issues and fix them on hundreds of thousands of endpoints in minutes rather than days. As a result, McAfee Real Time Command dramatically reduces the cost...

View More
flow-image
SafeNet

Virtual Private Networks: When Virtual Security is Not Enough

This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.

View More
flow-image
Symantec

Managing the SSL Certificates with Ease

This white paper will present the lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, why poor management is potentially dangerous to the enterprise, and how the right SSL certificate management tool can help enterprises keep track of and manage SSL certificates more...

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon