Infosecurity White Papers
2014 Symantec Internet Security Report
Today’s threats differ from those that organizations encountered earlier. Understanding the latest threat information is one of the essential keys for protection against evolving cyber-attacks—especially as they increase in number and complexity.
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticators benefits security and reduces cost
Identity and authentication management represents the greatest security return on investment an organization can make.
Magic Quadrant for Endpoint Protection Platforms
Effective endpoint security leads the way for business success, but with more vendors than ever claiming best-in-class status, identifying the solution right for you can be a daunting task.
Cyberthreat Defense 2014 Report for North America& Europe
Know your enemy! Establishing an effective defensive strategy is crucial with today's rapidly evolving cyberthreats. Understanding the cybercriminals' techniques used to perpetrate successful attacks is essential.
Broken Trust: Exposing the Malicious Use of Keys and Certificates
Published jointly by iSIGHT Partners and Venafi, this whitepaper explores the motivations of attackers, the practices they employ to execute their attacks, and what you can do to keep these criminals out.
Understand The State Of Data Security And Privacy: 2013 To 2014
This Forrester data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in North American and European organizations for 2013 to 2014.
It’s Cyber Warfare
How UK financial institutions can implement identity-based security to win the war against online attacks.
Data Security Architecture Overview
The Vormetric Data Security Architecture white paper provides an understanding of the architectural underpinning of Vormetric Data Security Platform, a comprehensive solution for a data-centric security architecture for minimizing the attack surface of sensitive data and to assist in meeting data compliance requirements. It uses Vormetric Data Firewall™, encryption, access controls and security intelligence across physical, virtual and traditional environments.
Information Security Industry Predictions for 2014: Cloud
Infosecurity asked the industry to share its 2014 trend predictions, and the industry delivered. We have categorised the predictions into five topics and created a news article for each.
Data Security in the Cloud
Cloud computing has transformed the way organizations approach IT, enabling them to become more agile, introduce new business models, provide more services, and reduce IT costs. Cloud computing technologies can be implemented in a wide variety of architectures, under different service and deployment models, and can coexist with other technologies and software design approaches.
Server Data is the Main Target for Advanced Persistent Threats
Cybercrime continues to make headlines but the nature of the attacks is changing. Within a few weeks of each other in early 2013, The New York Times, Apple, Twitter and other high-profile organizations openly admitted to significant data breaches. However, the nature of cyberattacks is changing. Threats have become more frequent and insidious, and the cloud and Big Data have added new risks.
Five Key Ways to Increase Network Security
Why enterprises need to take a smart approach to DDI (DNS, DHCP, IP Address Management) to protect their infrastructure.
The 2013 Vormetric Insider Threat Report
While the security community remains fixated on advanced malware, tried-and-true insider threats and related attacks remain a vexing problem for most organizations. In fact, ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect/prevent today than they were in 2011.
Big Data, Big Risks
The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and reliable protection strategies.
Analysis of the Global Network Access Control Market
Solve top IT challenges with NAC. Streamline and automate your IT operations today.
Website Security In Corporate America
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction.
Securing Sensitive Data within Amazon Web Services EC2 and EBS - Challenges and Solutions to Protecting Data within the AWS Cloud
In this white paper, learn about the specific problems around data protection when using servers within Amazon Web Services (AWS) environments.
Symantec 2013 Internet Security Threat Report
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report.
The Insider Threat: How Privileged Users Put Critical Data at Risk
With insider-related fraud up 43% in 2012, clearly traditional security approaches are not working. Data loss prevention (DLP) systems, Internet monitoring tools and other controls are failing to stop a growing number of data breaches linked to insiders
Frost & Sullivan: Analysis of the Global NAC Market
The comprehensive Frost & Sullivan global NAC market analysis highlights drivers, technology trends, competitive landscape and required product competence.