IT Security: Application Security

Click for details

The Hidden Costs of Microsoft Office 365 Security & Compliance

Click for more details

Download…

Click for details

The BEC Survival Guide

Click for more details

Download…

Azure Active Directory and Office 365 Security

Click for more details

Download…

Click for details

2017 Annual Threat Report

Click for more details

Download…

Click for details

Making the Business Case for Office 365

The current iteration of Office 365 represents Microsoft’s 15-year-plus history of remotely hosted offerings that began in the late 1990s with hosted delivery of Microsoft Exchange through a variety of business partners. So, can a business case be made for deploying Microsoft Office 365? Absolutely yes, and man organizations agree, as shown in the following figure that shows the projected growth of Office 365 over the next two years.

Download…

Click for details

Threat Research: Targeted Attacks on Enterprise Mobile

Click for more details

Download…

Click for details

Securing Cloud-Based Communications

Use of the cloud for business-critical services continues to increase as corporate and government networks de-perimeterize. This whitepaper discusses key requirements for securing cloud-based communications.

Download…

Click for details

Protecting Intellectual Property in Email

Read this whitepaper to learn about guarding against information-stealing malware and outbound data loss.

Download…

Click for details

Supercharge Your Security

This whitepaper discusses how to improve security levels and event response with automated network intelligence.

Download…

Click for details

Scanning Web Applications for Vulnerabilities

This whitepaper looks at how to scan web applications for vulnerabilities and safeguard your critical web applications.

Download…

Click for details

Protecting Information

For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.

Download…

Click for details

Security Management 2.0: Time to Replace Your SIEM?

This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Download…

Click for details

Corporate AV/EPP Comparative Analysis­ – Exploits-Evasion Defenses

A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.

Download…

Click for details

A Buyer’s Guide to Endpoint Protection Platforms

A Gartner report showing its key findings, recommendations and analysis of endpoint protection platforms.

Download…

Click for details

Network Intrusion Prevention System

NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.

Download…

Click for details

A Prudent Approach to Next-generation Network Security

This whitepaper assesses a new strategy for network security. Read on to find out more…

Download…

Click for details

The Big Security Data Challenge

This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.

Download…

Select a topic