Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like IT, enterprise integration and open source.

Filter the library by ...

White Paper | Presented by Symantec

Defense in Depth Is Necessary to Win the Battle for the Endpoint

In the world of endpoint security and antivirus, there is a need to shift away from using signatures as the primary method for malware prevention. No less than 37 new endpoint security products have emerged in the past five years, each claimed to address the changing landscape. But how do you know who to use, when to use them and if it will be enough to protect your enterprise?

White Paper | Presented by Symantec

Endpoint Security - Market Quadrant 2016

Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure. Read this edition of Radicati Market Quadrants as it covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging players organizations should look out for.

White Paper | Presented by Symantec

Symantec Endpoint Protection 14.0

To handle new forms of threats like cyber espionage or ransomware enterprises need to evolve their endpoint protection solutions to cover all threat surfaces. Read this report to review the effectiveness of seven different products, on several different attack vectors and learn how you can make your strategy as effective as possible.

White Paper | Presented by Symantec

The Forrester Wave: Endpoint Security Suites, Q4 2016

The endpoint security market is continuously growing as many customers find endpoint security suites to be effective in tackling their top security concerns. However, the market is now very fragmented with vendors approaching endpoint security in different ways.

White Paper | Presented by Delta Risk

Cybersecurity and the Board of Directors

A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk. Yet, there are several factors that tend to prevent effective engagement in cybersecurity risk at the board level.

White Paper | Presented by Delta Risk

Cybersecurity Primer for Banking and Finance

As stated in a recent issue of the FDIC's Supervisory Insights, the risks presented by cyber attacks have become "one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks." In just a year's time, from 2014 to 2015, security incidents increased 38 percent.

White Paper | Presented by Delta Risk

Cyber Security Primer for Healthcare

Healthcare providers hold a special place in today's society. Most people count healthcare workers among the most admirable of professional jobs, and nearly everyone has to trust a healthcare professional with their lives or the lives of loved ones at some point. Nine out of every 10 American adults see doctor as a prestigious profession, for example, with older generations in particular holding it in high regard.

White Paper | Presented by Delta Risk

Top 10 Cyber Incident Pain Points: Are You Prepared?

Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise?

eGuide | Presented by Delta Risk

What You Need To Know About Ransomware & HIPAA Compliance

There is no more hedging on whether ransomware incidents should be identified and treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA). The United States Department of Health and Human Services Office for Civil Rights (OCR) has stated that ransomware attacks constitute a breach unless there is substantial evidence to the contrary.

Best Practices for Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them, putting them at serious risk of data breaches, non-compliance with their regulatory obligations, and loss of intellectual property. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

Load More