Assessing Risk Reports

Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Find the Right EFSS to Secure Employee File Sharing
sponsored by Trend Micro, Inc.
EGUIDE: This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Trend Micro, Inc.

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.

Cybersecurity skills shortage demands new workforce strategies
sponsored by IBM
EGUIDE: The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

IBM