Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Security Management

Browse through our extensive list of free Security Management magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

Managing the Hidden Causes of Data Breaches It’s a big problem when the amount of data collected outpaces the ability to protect it...
Health Management Technology Has been the Source for Healthcare Information Systems Solutions since 1980...
2016 Top Trending IT Security Resources Download this kit to learn everything you need to know about IT Security...
Cloud Delivers 2.1 Times More ROI With cloud delivering 2.1 the ROI of on-premise applications with lower initial and ongoing costs, and the..
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
Cyber Crime and IT Risk The top articles for Risk Professionals seeking up-to-date knowledge of key regulation and compliance...
Citizen Developers are Integral to the Digital Workplace: Fireside Chat Discover smart ways of empowering end users to create..
The Client Mandate on Security Like most other organizations, law firms face new challenges every day when protecting their confidential..
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Operationalizing Security & Policy Compliance: A Unified Approach for IT, Audit and Operation Teams Learn the five major information..
Discovering the Unknown: Reducing the Risk of Unauthorized Access to Enterprise Applications and Resources Learn how to maintain an..
Managed Appliances: Security Solutions That Do More Learn how managed appliances enable efficient security management by reducing daily..
The Cyber Security Playbook: What Every Board Of Directors Should Know Before, During, And After An Attack. This playbook is a starting..
Business Justification for Privilege Management Learn the benefits Enterprise IT Managers gain by deploying privilege management solutions..
The Numbers Game: How Many Alerts is too Many to Handle? This report details the survey results of all aspects of alert management -..
Dynamic Access Control: Beyond Classic NTFS Permissions Discover how Dynamic Access Control in Windows Server 2012 lets you manage access to..
The Big Shift to Cloud-based Security Learn how small and medium-sized organizations can manage their IT risks and maintain regulatory..
Addressing Red Flag Requirements Learn how to use SIEM to implement compliance monitoring...
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
Advanced Threat Targets in Europe, Middle East and Africa: What You Need To Know Get an overview of the advanced persistent threats..
The Business Case for Protecting Against Advance Attacks: Demonstrating the ROI of FireEye as a Service to Non-Technical Executives This..
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
Schrodinger Helps Pharmaceutical Researcher Make Breakthroughs Sooner with the Help of AWS Find out why Schrodinger turned to Amazon Web..
Recognizing Five Sources of High-Profile Data Security Breaches Security breaches have rapidly escalated into a major source of reputational..
How a Cyber Threat Group Exploited Governments and Commercial Entities for Over a Decade This special report is a starting point to help an..
3 Key Benefits of Desktop Lockdown with Privilege Management Learn about the advantages when end users are operating without local..
SANS Analytics and Intelligence Survey Despite perceived gains in security analytics and intelligence capabilities, many organizations are..
Isn't The Cloud Already Secure? Learn how to protect corporate data in the cloud...
Human Vulnerabilities in Our Current Threat Landscape Discover how the current threat landscape pertains to human vulnerabilities and how to..
The Generation-D Dilemma: How Tech-Savvy Workers are Affecting Enterprise Security Learn how to enable your digital workers without losing..
Network Security Report: The State of Network Security in Schools Discover what IT administrators find most challenging about securing their..
5 Things You Need to Know about Security and UC The decision to invest in new technology should never be taken lightly...
Ten Risky Security Behaviors to Avoid: Protect Your Organization Learn about common risky behaviors that typical workers engage in and what..
Security: The Wireless Revolution is Here Learn to address security risks in wireless handheld computing systems with a solution that..
Securing Sensitive Data in File Shares View this on-demand webinar to learn how to effectively manage access to data in file shares...
Detecting Insider Threats How Splunk software is used to safeguard financial data...
Meer Veiligheid, Minder Frictie 5 belangrijke feiten over het beveiligen van digitale werkplekken...
Best Practices for Security Remote and Mobile Devices Discover the best practice approach to mobile and remote security designed to..
4 Critical Risks Facing Microsoft® Office 365™ Implementation It seems nearly every technology discussion today somehow involves the..
Financial Institution Threat Report The latest data and analysis collected from 954 financial institutions on the security incidents that..
Banking IT Systems Management: Challenges and Solutions Learn how financial institutions can proactively monitor and manage their IT..
To Outsource or Not to Outsource: That is the Network Security Question This paper discusses how to cost-effectively turn the tables on..
The Importance of Cyber Resilience and Incident Response for Financial Institutions For most financial institutions, it's no longer a..
Security Intelligence: Information Sharing Strategies Using Trusted Collaboration Human-source Intelligence (HUMINT) has been used for..
Cybercrime 101 Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental...
Mobile Security: How to Secure, Privatize, and Recover Your Devices: Chapter 3 - Privacy - Small Word, Big Consequences Learn how to keep..
HackerProof: Your Guide to PC Security By downloading this free guide, you agree to receive regular updates on the latest cool apps, product..
DCI Donor Services Focuses More Time on Saving and Enhancing Lives Thanks to a Secure IT Environment Discover how DCI Donor Services..
CREDANT® Mobile Guardian® External Media Shield Discover how to access and update external media from any computer without compromising..
7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction Learn essential aspects of putting into place a measurable..
Changing the Security Monitoring Status Quo Solving SIEM problems with security analytics...
The Holistic Approach to Targeted Attack Prevention Detect and monitor for cyber attacks...
10 Things Security Experts Wish End Users Knew Learn about the 10 concerns that security experts want you to know...
The Value of QRadar® QFlow and QRadar® VFlow for Security Intelligence As the security threats facing organizations have grown..
Picking a Sensible Mobile Password Policy for Your Employees SilverSky's Chief Technology Officer discusses six policy elements that will..
Create a Safer Environment with End-to-End Protection for Healthcare and Academics Discover how Rush University Medical Center gained a..
Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance This guide provides a step-by-step guide for automating the..
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
Server Security: Not What It Used to Be! This IDC Technology Spotlight highlights how cloud computing and virtualization have transformed..
Finding a Cure for Downtime 7 Tips for Reducing Downtime in Healthcare Information Systems..
Why the Threat of Downtime Should Be Keeping You Up at Night Learn how to easily protect your security systems and keep them running 24/7...
Securing Your Future in the Cloud 10 key questions to ask when assessing & selecting a cloud services vendor...
The Executive Guide to Data Loss Prevention Reported data breaches increased by nearly 50 percent in 2008 and industry and regulatory..
Snake-in-the-Grass Syndrome Protect Private Information through Redaction: Analysis and Recommendation..
Achieving Configuration Compliance in a Regulatory Framework Find out how to achieve automated configuration compliance with an appliance..
Comprehensive Review of Security and Vulnerability Protections for Google Apps Find out how Google protects and secures your company's..
The Case for Security Information and Event Management (SIEM) in Proactive Network Defense Critical elements of effective SIEM systems..
Virtual Patching: Lower Security Risks and Costs This white paper reviews challenges with security patch management including risks to..
The Clock is Ticking on Windows Server 2003 Support This white paper reviews the risks facing organizations running End-of-Life (EOL)..
Five-Step Plan for Securing Your Enterprise WLAN Decomposes the challenge of securing an enterprise WLAN and recommends best practices to..
Using Micro-Segmentation to Make Cybersecurity Work Learn why micro-segmentation is the great security hope that will allow your..
Accelerate Insight for Financial Services: Reduce Risk. Stop Fraud. Increase Profits. Learn how the ParAccel Analytic Database (PADB)..
Authentication Solutions Through Keystroke Dynamics Provides an in-depth study of keystroke dynamics and how it's used today to fully secure..
It's Time Businesses Wake Up to Mobile Security Reality Ready or not, you need an MDM solution...
Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from..
Narrowing the Security Gap with Automated Configuration Assessment Learn how to ensure the safety of sensitive data and IT while meeting..
7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction Learn essential aspects of putting into place a measurable..
5 Strategies for Email Data Loss Prevention The average employee sends and receives about 110 emails each day or 29,000 emails per year...
An Innovative Approach to Protecting Critical Data Learn how to protect critical data by concealing network endpoints and assets from..
Extracting Value from Enterprise Log Data Leverage a log management solution to automate security monitoring and regulatory compliance,..
SANS Analyst Review - Log Management SANS Analyst Review of Log Management, highlighting ArcSight Logger, by analyst Jerry Shenk...
A Comprehensive Mobile Threat Assessment Find out what FireEye researchers uncovered when they analyzed more than 7 million iOS and Android..
IT GRC Turning Operational Risks into Returns Learn how to turn your company's IT GRC processes into strategic assets...
The Complete Guide to Log and Event Management Learn about SIEM and Log Management use cases, differences, best practices and common..
How to Make a Case for Investing in an Integrated Cyber Security Platform This white paper demonstrates the ROI of FireEye as a Service to..
Why Cloud-Based Security and Archiving Make Sense Learn how email archiving has become a critical “best practice” for..
Demystifying the Payment Card Industry – Data Security Standard Learn the 12 requirements for compliance with the PCI Data Security..
Why Cloud-Based Security and Archiving Make Sense Cloud computing is one of the most significant trends in IT today...
Why Some Things Shouldn't Go Viral Preventing breaches is only as effective as your employees' grip on their devices...
IPSec vs. SSL VPNs for Secure Remote Access Learn how Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec..
TriGeo Security Information Management in the Payment Card Industry: Using TriGeo SIM To Meet PCI Requirements Security Event and..
Five Strategies for Email Insider Threat Prevention Best practices to help prevent sensitive information leakage, while keeping up with the..
A Summary of Russia's Threat in Cyberspace This paper looks at an Advanced Persistent Threat (APT) group engaged in espionage against..
Using Trend Micro's Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance Meeting PCI Compliance in a physical, virtual or..
Keeping Your Laptop Users Up & Running How to address business continuity, information security, policy enforcement, and regulatory..
EMA Research: The Business Case for Striking an Optimal Balance of Endpoint Control Tips for determining ROI related to locking down PCs...
Quantifying the Value of Software Asset Management Discover how a SAM solution can drive real benefits and cost savings to your organization...
HIPAA and Beyond - How to Effectively Safeguard Electronic Protected Health Information Explore how to go beyond HIPAA by learning how to..
Why the Threat of Downtime Should Be Keeping You Up at Night Learn how to easily protect your security systems and keep them running 24/7...
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
NAC: Managing Unauthorized Computers Learn how your enterprise can combat today's threats and still remain nimble enough for tomorrow's..
15 Steps to Reducing Security Risks in Business Mobility For small to medium-sized businesses, malicious attacks are by far the leading..
Combating First-Party Fraud - A New Approach Learn about the challenges involved in combating first-party fraud and emerging best practices...
Get Started with GLBA and FFIEC Compliance How to build effective risk assessment processes in banks and credit unions...
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
When Worlds Collide: Cloud Apps and Financial Services Learn how to use cloud access security brokers to overcome cloud security and..
Best Practices for Securing Your Enterprise Wireless Network Learn five best practices to secure enterprise networks from unauthorized use..
The 7 Things that IT Security Professionals MUST KNOW! Gain key insight into security problem and find the safest means to protect your..
10 Ways Everyone Should Approach Cybersecurity in 2015 Discover 10 key lessons we need to learn (or learn again) from cybersecurity..
5 Ways Your VMware and Hyper-V Backups May Fail You HA technology is fantastic and is great for protecting VMs in certain situations but it..
Copyright © 2016 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices