CSO Whitepapers


Sort by: Date | Company | Title


CA Technologies Strategy and Vision for Cloud Identity and Access Management
By CA Technologies | 29/5/2014

Cloud computing introduces new security challenges for both consumers and providers of cloud services across all types of IT environments. CA’s strategy and vision outlines how to securely provision users, and choose & simplify an IAM deployment models.

Download this now


Enabling and Protecting the Open Enterprise
By CA Technologies | 29/5/2014

A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

Download this now


It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
By Skybox Security | 10/7/2017

Your approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were “critical” isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low–hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t be tagged as a high priority in a purely vulnerability–centric approach.

Download this now


New Study Reveals Benefits from a Single Vendor, Multi-layered Solution
By Trend Micro Australia | 29/5/2014

In a new custom study commissioned by Trend Micro, Forrester Consulting surveyed over 1100 IT security decision makers from North American, European, and Asia Pacific companies with 100-5,000 employees.

The study identifies the benefits these IT professionals found from having a single-vendor, multi-layered solution. The benefits are:

- Reduced operational friction - Reduced cost - Better protection

Complete User Protection Trend Micro Complete User Protection is a multi-layer solution that provides your customers with the broadest range of interconnected threat and data protection across endpoints, email and collaboration, web, and mobile devices.

Download this now

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?