Assessing Risk Reports

A Computer Weekly buyer's guide to managing paper processes
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

The Evolution of Network Security Hardware
sponsored by Aruba Networks
EGUIDE: This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

The top threat intelligence services for enterprises
sponsored by UnitedLex
EGUIDE: If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

How Threat Intelligence Can Give Enterprise Security the Upper Hand
sponsored by SurfWatch Labs
EGUIDE: This expert e-guide explores the value of security intelligence in giving you the upper hand on outside threats.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SurfWatch Labs

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Symantec & Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Symantec & Blue Coat Systems

Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE: This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Smarsh

Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint