Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

Gartner’s 2014 Magic Quadrant for Secure Email Gateways Report

Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2014 Magic Quadrant for Secure Email Gateways report. Read the full report, compliments of Proofpoint.

Brought to you by
Proofpoint

Forrester Research: Gaps in SSH Security Create an Open Door for Attackers

In this Technology Adoption Profile (TAP) by Forrester Research, analyst, John Kindervag, emphasizes, “Two-thirds of IT security professionals do not perform the necessary checks for unauthorized use of SSH keys.”

Brought to you by
Venafi

Enterprise Application Security - The 5 Key Benefits of Source Code Analysis

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. Two categories exist in this realm: Binary Code Analysis (BCA) and Source Code Analysis (SCA).

Brought to you by
Checkmarx

The Human Factor: How Attacks Exploit People as the Weakest Link in Security

Get Insight into the ways attackers exploit end-users’ psychology. Learn how attackers exploit end-users have significant security implications for enterprise preparedness and defensive strategies.

Brought to you by
Proofpoint

Solution Brief: Are You Ready for the PCI DSS v3 Deadlines?

Are you one of those organizations that meet the PCI DSS requirements for keys and certificates using internal scripts or manual processes just in time for your next audit, after countless hours of preparation?

Brought to you by
Venafi

Gartner Paper: Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks and new sophisticated forms of malware.

Brought to you by
Proofpoint

Broward College Increases Visibility, Control & Compliance with ForeScout CounterACT

Broward College needed a secure, efficient and flexible way to manage the personal and college-owned devices connecting to its network, spanning four campuses and seven satellite locations.

Brought to you by
ForeScout

2014 Global Compliance: The legal obligations for encryption of personal data in the United States, Europe, Asia and Australia

Updated for 2014, this document examines the global legal obligations to encrypt personal data – included both national and industry drivers.

Brought to you by
Vormetric

Secure Data Center Architecture for Today's Transformative IT Environment

Learn about Juniper Network's MetaFabric reference architecture to address your cloud, mobility and big data challenges which form part of your business drivers today.

Brought to you by
IGX

IDG Survey: State of IT Cyber Defense Maturity

Download this global survey from over 1500 IT security professionals that sheds light on the state of cyber defense maturity. In addition to affording new incident and violation trends across industry and region, the results yield insights into IT security management capabilities, deficiencies and planned investments. See where your organization fits on the IT cyber defense maturity spectrum compared to your peers.

Brought to you by
ForeScout

Server Data is the Main Target for Advanced Persistent Threats: THE CASE FOR A DATA-CENTRIC SECURITY MODEL

This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats.

Brought to you by
Vormetric

Ogren Group Report: Continuous Endpoint Compliance. Integrating Process, Policy and Technology to Preempt Threats and Reduce Costs

Many organizations spend millions on endpoint security tools – such as antivirus, encryption, data loss prevention (DLP), and so on – only to have end users turn off or disable those tools. Even in well-managed enterprises, host-based security tools typically do not work properly on at least 20% of systems.

Brought to you by
ForeScout