Security Whitepapers


Sort by: Date | Company | Title


The business case for protecting against advanced attacks: Demonstrating ROI to non-technical executives
By FireEye | 10/7/2015
This whitepaper looks at how to demonstrate the potential return on investment (ROI) of an enterprise-class advanced security solution to non-technical executives with a with a checklist of the key points you need to emphasise for a positive outcome. Your executives need to know the challenges you face and the risk if you don’t find solutions.
Download this now


M-Trends® 2015: A view from the front lines
By FireEye | 10/7/2015
While we have seen modest gains in organisations’ ability to attack the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. This whitepaper looks at the developments for 2015 and how these developments paint a threat landscape that is more complex than ever.
Download this now


Implementing mobility/BYOD programs while maintaining regulatory compliance
By Dell | 19/6/2015
Organisations are readily launching BYOD programs to boost employee productivity and reduce costs. But this all comes at a risk and you maintain your vigilance in sustaining compliance with data security and privacy regulations. This whitepaper looks at several best practices are key for maintaining regulatory compliance with any BYOD program.
Download this now


Security intelligence: solving the puzzle for actionable insight
By LogRhythm | 16/6/2015
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent. Rather, organisations should work on the principle that it is probable that they have already been breached. Traditionally, many security technologies have focussed on preventing threats from penetrating their networks, but, faced with increasingly sophisticated, well resourced, and businesslike attackers with the ability to target specific individuals and organisations with tailor-made exploits and to evade such defences, such tools are no longer sufficient. Prevention alone is not enough.
Download this now


LogRhythm and Symantec: Symantec Security Information Manager (SSIM) Migration Program
By LogRhythm | 16/6/2015
Following Symantec’s end-of-sale announcement for Symantec Security Information Manager (SSIM), customers are looking for alternative solutions to meet their SIEM needs. For customers that want or require an on-premise solution, LogRhythm has developed a simple and efficient migration path from SSIM to LogRhythm’s best-inclass Security Analytics and Intelligence Platform.
Download this now


Password Hygiene: a security mandate, not a best practice
By LogRhythm | 16/6/2015
This infographic looks at the findings from research capturing the password hygiene trends and how employees are placing organisations at risk.
Download this now


Surfacing critical cyber threats through security intelligence
By LogRhythm | 16/6/2015
As organizations evolve their Security Intelligence maturity, the realized reduction in MTTD and MTTR significantly reduces the risk of experiencing a damaging cyber incident. Of course, each organisation needs to assess for itself the appropriate level of maturity based on its own risk tolerances.
Download this now


The cyber threat risk - oversight guidance for CEOs and boards
By LogRhythm | 16/6/2015
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Download this now


With honeypots and threat intelligence ecosystems, LogRhythm expands capabilities
By LogRhythm | 16/6/2015
Security information and event management (SIEM) products provide a plethora of data that can be enriched to the nth degree. However, this data is of little value unless it can be converted into meaningful information that organizations can use to proactively detect and respond to threats in an acceptable timeframe.
Download this now