Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Why Mobile Is the Next Digital Identity

Why Mobile Is the Next Digital Identity

How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?

Brought to you by
Entrust

Compliance Support For ISO 27001

These published guidelines cover many areas surrounding “access control”, “audit and accountability”, “incident response”, and “system and information integrity”

Brought to you by
LogRhythm

451 Research: Honeypots, Threat Intelligence & SIEM

Security information and event management (SIEM) products provide a plethora of data that can be enriched to the nth degree. However, this data is of little value unless it can be converted into meaningful information that organizations can use to proactively detect and respond to threats in an acceptable time frame.

Brought to you by
LogRhythm

BLOOR: Security Intelligence: Solving the Puzzle for Actionable Insight

…reducing the time to detect and respond to advanced cyber threats

Brought to you by
LogRhythm

Is the Cloud Ready to Manage Security?

Far from just being a storage space, the cloud is a resource that’s changing the very nature of business. It can be leveraged to broaden the sphere of enterprise operations, as well as bolster the efficacy of business transactions and improve company-client relations. The mobility built into the cloud means that organizations of all sizes can enjoy a business world without limits.

Brought to you by
Entrust

Discover How Customer SIEM Requirements Have Evolved

In this paper, Securosis, details how security needs have evolved for organizations and what to look for when choosing a SIEM.

Brought to you by
IBM

What Financial Institutions Need to Know About Secure Shell

Secure Shell is ubiquitous within the financial services industry. However, Secure Shell is often viewed as “part of the plumbing” and typically does not get much attention from Compliance, Audit or Security.

Brought to you by
SSH Communications Security

Video Download: An Enterprise Security Platform Approach to Threat Prevention

Video Download: An Enterprise Security Platform Approach to Threat Prevention

Adversaries are becoming more advanced, carrying out high profile attacks against enterprises, government, the defense industrial base, and other key industries.

Brought to you by
Palo Alto

Video Download: Hiding in Plain Sight - What’s Really Happening on Your Network

Video Download: Hiding in Plain Sight - What’s Really Happening on Your Network

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against.

Brought to you by
Palo Alto

Getting Started With a Zero Trust Approach to Network Security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.

Brought to you by
Palo Alto

Application, Usage and Threat Report

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise.

Brought to you by
Palo Alto

Gartner’s 2014 Magic Quadrant for Secure Email Gateways Report

Gartner’s 2014 Magic Quadrant for Secure Email Gateways Report

Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2014 Magic Quadrant for Secure Email Gateways report. Read the full report, compliments of Proofpoint.

Brought to you by
Proofpoint