• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Lang: CN | EN
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • Data Loss Prevention (DLP)
flow-image
McAfee

Manage Security and Risk... Get Proactive About Managing Risk

Compliance and financial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept. 

View More
flow-image
Symantec

The Cyber Resilience Blueprint: A New Perspective on Security

This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs. 

View More
flow-image
Kaspersky

IT Security by the Numbers: Calculating the Total Cost of Protection

Cloud computing … mobile devices … web applications… virtualization. It seems there are backdoors into your systems from every direction. And that’s before you’ve even considered the threat presented by the very applications your end users need to get their jobs done. Third-party applications...

View More
flow-image
Carbon Black

Building the Business Case for Improving Endpoint Security

As a security provider, we understand that convincing executives to make changes to their stack can be difficult. It’s important to clearly demonstrate return on investment (ROI) for any security build out, so that your team becomes more effective with every dollar committed.  It’s important that...

View More
flow-image
Cisco

Cloud Web Security Using Cisco ASA - Technology Design Guide

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...

View More
flow-image
HP

Enhance Data Protection: HP Storage and CommVault Simpana

Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance...

View More
flow-image
Kaspersky

Your Data under Siege: Defeating the Enemy of Complexity

There are three important truths in today’s cyberlandscape: First, your company is the custodian of valuable, confidential data, applications and IT infrastructure that drive nearly half of all economic activity. Second, all companies face the same security threats. And third, you are challenged...

View More
flow-image
FireEye

Thinking Locally, Targeted Globally

A new FireEye white paper, “Thinking Locally, Targeted Globally - New Security Challenges for State and Local Governments,” outlines the severity of the problem facing state and local agencies and details three critical steps you need to take to protect your organization.

View More
flow-image
McAfee

Supercharge your Security: Improve security levels and event response with automated network intelligence

Attacks don’t operate in silos, but many security programs do. Fragmented security technologies and inefficient event response leave organizations severely vulnerable to sophisticated threats. To be successful, organizations need to combine accurate, integrated network security with a consolidated, intelligent...

View More
flow-image
ESET

Rethinking endpoint and email security for the BYOD era

The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own. In a survey of...

View More
flow-image
Proofpoint

Reimagining Email Security

In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...

Published: Jun 17, 2021
View More
flow-image
Staminus Communications

True Cost of DDoS Attacks for Hosting Companies

In this installment of a series of white papers about the true cost of DDoS attacks, StamSOC (Staminus Security Operation Center) will discuss the history of these attacks, the wide reaching impacts, and the true costs associated with DDoS attacks. Business operators often overlook the repercussions of DDoS attacks....

View More
flow-image
AccessData

Threat Intelligence & Incident Response Study 2013/14

When a cyber attack or other security incident occurs, CISOs and their security teams must be able to explain the details of the incident to senior management. Often without being given the time to gather the necessary intelligence to provide an accurate assessment of the problem.

View More
flow-image
FireEye

The Need for Speed: 2013 Incident Response Survey

With malware attacks growing more sophisticated, swift, and dangerous by the day — and billions of dollars spent to combat them — surprisingly few organizations have a grip on the problem. Only 20 percent of security professionals surveyed by Information Security Media Group (ISMG) rated their incident response...

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon