IT Security: Spyware

Click for details

How Ransomware can hold your Business hostage

Understanding Ransomware attacks and how they're delivered

Download…

Click for details

La fin des antivirus ?

Click for more details

Download…

Click for details

Arguments en faveur de la sécurité multicouche

Click for more details

Download…

Click for details

Perché La Protezione Multi-Livello é Importante

Click for more details

Download…

Click for details

Il business case per la sicurezza a più livelli

Click for more details

Download…

Click for details

Calcolo del ritorno del capitale investito nella sicurezza a più livelli

Click for more details

Download…

Click for details

APT28: A Window into Russia’s Cyber Espionage Operations?

Our clients often ask us to assess the threat Russia poses in cyberspace. Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations.

Download…

Click for details

Protecting Intellectual Property in Email

Read this whitepaper to learn about guarding against information-stealing malware and outbound data loss.

Download…

Click for details

Protecting Databases: Boosting Security Against Today’s Attacks and Loss Vectors

Download this whitepaper for more information on how to boost security against today’s attacks and loss vectors.

Download…

Click for details

Supercharge Your Security

This whitepaper discusses how to improve security levels and event response with automated network intelligence.

Download…

Click for details

Scanning Web Applications for Vulnerabilities

This whitepaper looks at how to scan web applications for vulnerabilities and safeguard your critical web applications.

Download…

Click for details

Managing Risk in Changing Times

As an IT security executive, you have to love challenges. Otherwise, why would you stay in a profession where you’re tested every day by hackers, thieves, and corrupt organizations? A profession that requires constant vigilance, even as the boundaries of your organization change minute by minute.

Download…

Click for details

Protecting Information

For more information and best practice considerations on how to boost security against malicious insiders and external attacker, download this whitepaper.

Download…

Click for details

Future-Proofing Email Security

Spearphishing, cost concerns, exploding spam rates, increasing compliance requirements,and new cloud-based deployment options may have you reevaluating your current email security solution. Read this whitepaper to find out the best solution.

Download…

Click for details

Security Management 2.0: Time to Replace Your SIEM?

This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Download…

Click for details

NSS Labs Corporate AV/EPP Comparative Analysis: McAfee Achieves Highest Score in Exploit Protection

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Download…

Click for details

Corporate AV/EPP Comparative Analysis­ – Exploits-Evasion Defenses

A report into the findings after the testing of 11 enterprise level endpoint protection (EPP) products.

Download…

Click for details

A Buyer’s Guide to Endpoint Protection Platforms

A Gartner report showing its key findings, recommendations and analysis of endpoint protection platforms.

Download…

Click for details

Endpoint Security: Anti-Virus Alone is Not Enough

The latest report by the Aberdeen Group asks the simple question: “Is anti-virus and a firewall enough security for businesses operating in today’s business environment?”

Download…

Click for details

Network Intrusion Prevention System

NSS Labs performed an independent test of the McAfee Network Security Platform (NSP) M-8000 v6.1. The product was subjected to thorough testing at the NSS Labs facility in Austin, Texas, based on the Network Intrusion Prevention methodology v6.2 available on www.nsslabs.com. This test was conducted free of charge and NSS Labs did not receive any compensation in return for McAfee’s participation.

Download…

Click for details

A Prudent Approach to Next-generation Network Security

This whitepaper assesses a new strategy for network security. Read on to find out more…

Download…

Click for details

SANS Survey on Application Security Programs and Practices

Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.

Download…

Click for details

Keep your PCs safe while surfing the Web

The Web has become a hub of information and productivity, making the web browser one of the most-used applications. This has drawn the attention of cyber criminals—making it a potential Achilles heel for security.

Download…

Click for details

Best Practices for Selecting a Vulnerability Management (VM) Solution

Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented.

Download…

Click for details

Vulnerability Management For Dummies

This free eBook provides a vital overview of Vulnerability Management, including your protection options and ten best practices to implement.

Download…

Select a topic