fbpx

Latest Security Whitepapers


Top 10 Requirements for Modern Endpoint Management Tools
Selecting the right endpoint management solution for your organization can be a daunting task. With continuous growth and accompany security risks, comes the need to realize complex endpoint management needs with smooth IT operations and tightened security posture. If you are not getting the best from your solution, it’s time to pull up your socks... Read More

10 Ways to Secure and Accelerate a Modern Workforce

Data lakes can store masses of structured or unstructured data in raw format until your enterprise needs that data for analytics. That’s why data lakes are now seen as an attractive alternative to traditional data warehouses. However, enterprises like yours struggle to realize the expected return on data lake investments because of unexpected data quality, data governance, and data immediacy challenges. This paper describes how to address these issues and prevent your pristine data lake from devolving into a useless data swamp.


Introducing Cloud Workload Protection Platform (CWPP) Intezer Protect
Intezer Protect defends your cloud workloads in runtime against the leading cause of cyber attacks: unauthorized and malicious code. In this webinar Intezer discusses the challenges in Linux and cloud security, Intezer Protect’s architecture, features and advantages as well as a live demo. Watch Video >> Name Company Name Job Title Your Email By ticking... Read More

Using Certificate-based Authentication for Access Control

Data lakes can store masses of structured or unstructured data in raw format until your enterprise needs that data for analytics. That’s why data lakes are now seen as an attractive alternative to traditional data warehouses. However, enterprises like yours struggle to realize the expected return on data lake investments because of unexpected data quality, data governance, and data immediacy challenges. This paper describes how to address these issues and prevent your pristine data lake from devolving into a useless data swamp.


Covid-19: Data protection & cyber security

We face significant challenges with the current global pandemic and the spread of COVID-19. Whilst inevitably there is a focus on our physical and environmental safety at home and at work, we must also maintain our individual cybersecurity health and wellbeing, including the protection of personal data and maintaining cybersecurity standards.


OneTrust GRC Integrated Risk Management

OneTrust GRC is an integrated risk management platform that delivers a complete, measured view of your business’s risk portfolio providing clear insights to leadership and expediting the execution of routine tasks


Practical pandemic planning

Firstly, don’t add a fourth ‘P’ for Panic, but do take the current outbreak and associated risks seriously. We are at the start of something that could impact us in many ways for an indeterminate period of time. A pandemic (we are not quite there just yet) falls under one of the four categories of ‘operational risk’. This is NOT a drill or an exercise, nor does this completely align with typical Business Continuity (BC) exercises or thought processes. However, BC, Incident Response (IR) plans provide elements that will help along the way. Similar to an adverse event a pandemic will evolve in its own way and at its own speed, it is as much about how we prepare and respond that will aid our ability to reduce risks and in this instance potentially survive.


IBM X-Force incident response and intelligence services named a leader in the Forrester Wave™: Cyber security incident response services,...

When reputation, revenue, and customer trust is at stake, it’s critical for organisations to be able to detect, respond and manage security incidents effectively. To address the need for comprehensive incident response, IBM Security created the X-Force Incident Response and Intelligence Services (IRIS) team to help organizations proactively manage cyber attacks.


Five reasons the service desk should care about information security

In many organisations there is a separate information security team that deals with all things relating to security. This team is responsible for designing and implementing all the controls needed to protect the organization, and for managing all major security incidents. So why does the service desk need to be involved, and what contribution should… Read More


Identity and Access Management (IAM) without compromise

IT and business executives are tasked with two strategic directives that seem inherently contradictory – they must empower the business and its people to operate at maximum speed while providing, at the same time, the optimum levels of security and risk management. Businesses of all sizes are being constantly challenged to effectively provide secure access… Read More


Data erasure for enterprise SSD – believe it and achieve it

Why should my organization be concerned about erasing SSDs? Considering that by the end of 2016, 40% of hard-drives will be SSDs, and these SSDs cannot be erased using the same overwriting methods as HDDs, the security risks are even greater for IT professionals. Download our Data Erasure for Enterprise SSD to understand the unique… Read More