Whitepapers


Sort by: Date | Company | Title


Data Center Security Gateway Test Report
By Juniper Networks | 11/12/2019

In Q4 2019, NSS Labs performed an independent test of the Juniper Networks SRX5400 JUNOS 18.2X30.1 Kernel 64-bit JNPR-11.0-20190316.df99236. This report focuses on the main differentiators for data center security gateway (DCSG) products: security, cost, and performance/functionality.

Download this now


Nine best practices for active directory security
By Quest | 26/11/2019

Upon discovering that someone has illegitimately accessed data on the network, IT managers initially believe (hope, really) that the threat came from outside. But as recent, headline-grabbing data breaches demonstrate, a lapse in internal security — whether accidental or malicious — is often what enabled the attack to succeed, in spite of robust external security. Download this whitepaper to see how to minimize the risk of the internal threat to the availability, confidentiality and integrity of AD.

Download this now


Unblocking Teamwork
By Data#3 | 26/11/2019

A new culture of work is emerging. For the first time in human history, there are five generations in the workforce, each with different approaches to getting things done. An environment that doesn’t encourage teamwork is one of the top five reasons people quit their jobs. Another employee attrition factor is a work environment that doesn’t accommodate working remotely. Download this whitepaper and see how to strategically break down teamwork blockers so that teams can work together with ease.

Download this now


How to protect against today’s #1 security risk: employees
By TeleApps | 7/11/2019

Today’s workplaces are becoming increasingly complex and fluid – particularly when it comes to security management. The modern worker expects to be able to work from anywhere, on any device, and at any time. Office spaces are no longer centralised with singular technology and protected by a robust firewall. They’re now wireless, with hot-desks, hybrid infrastructure (both cloud-based and on-premise), and all kinds of connectivity scenarios. Unless your flexible, digital workplace is designed with security as top of mind, security issues can very easily occur – and can have a lasting impact on your business’ overall safety.

Download this now


How We Change Behaviour with Awareness Training Datasheet
By Mimecast | 30/10/2019

This datasheet explores how Mimecast Awareness Training tangibly increases end-user knowledge on basic, yet critical security issues - both what they are and what the user should do about them. Awareness Training users are 2.4 times more likely to know the answers on what they need to know to stay safe.

Download this now


Mimecast Threat Intel eBook
By Mimecast | 30/10/2019

The Cyber Resilience Think Tank presents its latest E-book on Threat Intelligence and how every CISO can make it a priority.

Download this now


Understanding Privileged Identity Theft
By Quest Software | 23/10/2019

This white paper will explain why privileged identities pose such a risk to enterprises, how they are compromised by attackers, how current methods fail to stop these threats, and how your organization can protect itself.

Download this now


SIEM Integration Best Practices: Making the Most of Your Security Event Logs
By Quest Software | 23/10/2019

THE GREAT LOG COLLECTION DEBATE Many organizations put their SIEM at the center of their log collection, archiving and analysis model. But when combined with a couple of hard facts and an inconvenient truth, this model often leads organizations to make the potentially catastrophic choice not to collect all their log data.

Here’s how the reasoning frequently goes.

Download this now


Hybrid IAM offers Flexibility and Enhanced Security
By Quest Software | 23/10/2019

One of the fastest growing segments of the Identity and Access Management (IAM) market is the cloud segment. Increasingly, companies are choosing to move at least part of their security infrastructure to cloud-based solutions. Even if you still run critical IAM service on-prem, there’s a great chance you manage and integrate with cloud applications. Here are the benefits of deploying or migrating to cloud-based IAM solutions.

Download this now


Detect, defend against and recover from insider attacks
By Quest Software | 23/10/2019

Accept that sooner or later you’re going to have someone prowling around your network looking to cause damage or steal your critical data. Even the best perimeter defenses can do nothing to stop them, so it's essential to also have strong Active Directory security and governance in place.

Here is a how to on combating the insider threat effectively.

Download this now