Skip Links

Network World

Resource Library

  • Demand More, Get the Most from the Move to a Next-Generation Firewall
    Source: McAfee. A Part of Intel Security.
    White Paper: Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
  • Protect Against Advanced Evasion Techniques
    Source: McAfee. A Part of Intel Security.
    White Paper: Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.
  • Advanced Evasion Techniques for Dummies
    Source: McAfee. A Part of Intel Security.
    White Paper: Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.
  • The SSL Heartbleed Vulnerability: Impacts and Countermeasures
    Source: F5 Networks
    White Paper: Heartbleed is one of the worst security vulnerabilities in recent memory for organizations trusting OpenSSL to protect their data. Here are three easy steps to protect your business.
  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
    Source: Dell Software
    White Paper: Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common. Decoding and normalizing traffic across the network to detect and combat these attacks is critical for your network security plan.
  • Five Steps to Achieve Success in your Application Security Program
    Source: IBM
    White Paper: This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines that can be useful at different stages of your security program's maturity. By addressing key considerations, providing clear and actionable items, and offering real-world examples, these five steps provide an adaptable strategy to help your organization get started and maintain an effective, ongoing application-security strategy.
  • Gartner Magic Quadrant for Application Security
    Source: IBM
    White Paper: The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing the need to combine dynamic and static testing capabilities, which is reshaping the overall market.
  • Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility
    Source: IBM
    White Paper: This white paper from Enterprise Management Associates (EMA) discusses the unique challenges of managing mobile, desktop, and server endpoints in SMB-sized organizations. EMA offers pragmatic solutions and reviews IBM Endpoint Manager's ability to address the needs of these organizations.
  • Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution
    Source: IBM
    White Paper: In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence point for other endpoint management and control functions.
  • Best Practices Guide for IT Governance & Compliance
    Source: Dell Software
    White Paper: Federal regulations require businesses to know exactly what changes are made to structured and unstructured data within their corporate networks. Learn how the best practices for implementing a compliance solution in this white paper can help you minimize stress during your next IT compliance audit.
  • Managing Risk in an Active Directory Integrated Virtualized Environment
    Source: Dell Software
    White Paper: Explore the interdependent and combined security issues of Active Directory (AD) and virtualization, as well as how to identify and manage these risks. Gain insight into the native audit capabilities of these technologies and learn how they provide centralized visibility into your IT environment.
  • Enterprise Best Practices for Real Time Auditing and Event Archival
    Source: Dell Software
    White Paper: With data being generated at a record-setting pace, it's never been more critical for your organization to properly manage it. Learn how the insights in this white paper can help your organization intelligently collect, organize, store, and archive data.
  • Ensuring Enterprise Visibility, Auditing and Reporting
    Source: Dell Software
    White Paper: Learn how to easily identify and report on who has access to what files, folders and shares (and on what servers) in Active Directory. Plus, reduce the risk of security breaches and compliance failures in the process. Read this insightful tech brief.
  • The SIEM Evaluator's Guide
    Source: AlienVault
    White Paper: Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection, incident response and compliance management. When evaluating any technology, it's essential to outline your primary use cases and success factors. This guide provides essential SIEM evaluation criteria, "Pro Tips" and use cases, plus an overview of how AlienVault Unified Security Management (USM) meets each requirement.
  • 451 Group Report: AlienVault USM - A Security Operations Center for the SMB
    Source: AlienVault
    White Paper: "AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange." In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Results 1 - 15 of 144