Secure Website Reports

CW ASEAN: SD-WAN helps find best route to cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.
Posted: 08 Feb 2021 | Published: 12 Apr 2018

TechTarget ComputerWeekly.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Keeping Networks safe from Social Networking
sponsored by BlueCoat
EGUIDE: Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

BlueCoat

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

The Tangled Web of Data Privacy Issues
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

Thawte Inc.

GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012

GFI Software

How to prevent cross-site scripting attacks: Expert tactics
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

TechTarget Security

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies