WHITE PAPER:
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
EZINE:
This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
VIDEO:
This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
WHITE PAPER:
This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.
EZINE:
This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets.
WHITE PAPER:
This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
EGUIDE:
Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
PRESENTATION TRANSCRIPT:
There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options.
WHITE PAPER:
Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.