Security Whitepapers


Sort by: Date | Company | Title


Top 10 reasons to strengthen information security with desktop virtualization
By Citrix | 25/3/2014
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
Download this now


4 Secrets to Meaningful Security Discussions with the Board of Directors
By Citrix | 21/3/2014
Corporate boards are more interested in security than ever before. Here’s how to engage them in a strategic dialogue about a topic with bottom-line implications.
Download this now


3 Strategies to Manage Compliance Mandates
By Citrix | 21/3/2014
Meeting security-related compliance requirements is an increasingly complex job. Follow these best practices to easily manage compliance.
Download this now


IBM X-Force Threat Intelligence
By IBM | 20/3/2014
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM | 20/3/2014
Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
Download this now


Software Defined Protection - The Enterprise Security Blueprint
By CheckPoint | 11/3/2014
In a world with high-demanding IT infrastructures and networks, where perimeters are no longer well defined and where threats grow more intelligent every day, we need to define the right way to protect enterprises in the ever-changing threat landscape. Download today to define your security blueprint.
Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014
This report assesses the current state and effectiveness of vulnerability management.
Download this now


Keeping up with an Increasingly Sophisticated Threat Environment
By Tenable Network Security | 10/3/2014
Relying on traditional signature based Anti Virus alone is simply not sufficient to prevent today’s onslaught of new, sophisticated and advanced malware. This whitepaper describes in detail, some trends and statistics on the malware detection, it then introduces a multi-vector approach to accurately detect malware in the IT environment, and verify that existing anti malware already deployed are functioning optimally.
Download this now


Implementing an Effective Vulnerability Management Program
By Tenable Network Security | 10/3/2014
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
Download this now


50 Questions When Considering The Cloud
By Lyris Technologies | 30/1/2014
When considering whether or not to move to the cloud, there’s many questions you need to consider, and it’s unlikely that any single vendor will provide all the answers. This whitepaper provides your organisation a detailed list of security considerations to discuss both internally and with transparent vendors. Finding the right answers will help you develop a proper risk assessment and make informed decisions about cloud computing in your business.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?