White Papers
- SORT BY:
- Most Recent
- Topic
- Sponsor
-
FEATURED WHITE PAPERIT Security - Fighting the Silent Threat
Sponsor:KasperskyTopic:Data Protection, Security"IT Security - Fighting the Silent Threat" is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Download Now -
WHITE PAPERIT Pros Guide to Endpoint Protection: Top 5 Tips For Enabling A Self-Defending Endpoint
Sponsor:Lumension SecurityTopic:Data Protection, SecurityA common mistake many organizations make is to rely solely on AV, adjusting its protection settings so high that endpoint performance isabysmal.
Download Now -
WHITE PAPERClosing the Antivirus Protection Gap: A Comparative Study on Effective Endpoint Protection Strategies
Sponsor:Lumension SecurityTopic:Data Protection, SecurityIn order to conduct comparative malware testing, a model of the "Average Corporate Endpoint" was defined.
Download Now -
WHITE PAPERZetta Raises Series B Funding, Gains Momentum in Hybrid Cloud Backup/Recovery Fray
Sponsor:ZettaTopic:Application Management, Business Intelligence, Cloud Computing, Data Center, Data Protection, Disaster Recovery, SecurityThis independent report by 451 Research explores the offerings by Zetta highlighting its differentiation particularly in the areas of high performance and a plug-in for backing up NetApp systems.
Download Now -
WHITE PAPERDefense in Depth Matures
Sponsor:CDWTopic:Data Protection, Networking, SecurityOver the last few years, security risks have grown exponentially. Hackers, attackers and a motley crew of cyber thieves have enlisted far more sophisticated attack methods to put computers and entire networks at risk.
Download Now -
WHITE PAPERTop Security Threats for 2013
Sponsor:CDWTopic:Data Protection, SecurityAs cyberthreats intensify and workers bring more devices to work, IT shops need to sharpen their security tools. Is anyone safe?
Download Now -
WHITE PAPERSecurity Blanket: CDW Threat Check
Sponsor:CDWTopic:Data Protection, SecurityThis new threat assessment tool identifies a network's weaknesses, allowing the IT team to improve an organization's information security posture. Cyberthreats are growing in number, type and scale.
Download Now -
WHITE PAPERMagic Quadrant for Security Information and Event Management
Sponsor:HPTopic:Data Protection, SecurityBroad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring.
Download Now -
WHITE PAPERDelivering Endpoint Integration and Control
Sponsor:KasperskyTopic:Data Protection, SecurityRead this report to learn more about the offerings of platform-based secure content and threat management and why businesses should put an increased focus around an endpoint security platform implementation.
Download Now -
WHITE PAPERYour Data under Siege: Protection in the Age of BYODs
Sponsor:KasperskyTopic:Data Protection, Mobile & WirelessDownload Kaspersky Lab's new whitepaper, Your Data under Siege: Protection in the Age of BYODs, to learn about:- How a mobile workforce stretches your secured perimeter- Why saying "no" is not an effective BYOD policy
Download Now















