Network Level Threats White Papers

(View All Report Types)
Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER: This white paper introduces 5 steps you can take to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dropbox for Business

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise