Premium Content

searchSecurity E-Books

Featured E-Books

  • Unified threat management: What UTM product fits your organization?

    Companies are increasingly finding attractive the idea of unified threat management (UTM) systems, and vendors are responding with a range of products. Originally, smaller companies were the logical adopters of UTM technology, but now even giant enterprises see ways that large-scale UTM makes sense. If you think UTM might be in your company's future, there are several factors to consider, including how the product incorporates various security elements, the scale of its deployment and whether it should be hardware or a virtual product.

    This IT Decision Center outlines critical questions you must ask when considering a UTM product and provides insight on what UTM features will best meet your requirements. It also challenges UTM vendors to clarify what their particular products offer.

    Download Now

  • IT decision center: Endpoint security

    While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it's probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major endpoint players do a fairly good job at detecting traditional virus attacks. But more importantly, endpoints aren’t only about antivirus anymore.

    Endpoint protection uses tools like behavioral analysis, host-based intrusion prevention systems (HIPS), patch and configuration management, whitelisting, network access control and data loss prevention. Increasingly, these tools are deployed as part of a single-vendor suite, which, on the one hand, narrows the field, but on the other makes it difficult to make meaningful side-by-side comparisons. In this series, we take an independent look at the options in order to help you focus on your particular priorities, consider product and solution features that can help implement endpoint security and close with advice on how to make the final buying decision.

    Download Now

Other E-Books available for free to our members

    • Page 2 of 4
      • Web application firewalls: A technical guide

        Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web application firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

        View E-Book
      • PCI DSS: Next-generation data security, storage and integrity

        SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard. We have the latest PCI DSS advice and best practices from experts in this guide. Check it out today to get all of your PCI DSS questions answered.

        View E-Book
      • NERC compliance strategies

        SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation. Get the latest tips and expert advice on NERC compliance in one place.

        View E-Book
      • Combatting emerging Web threats In the enterprise

        Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at emerging Web threats and vulnerabilities, and how to protect your organization against them.

        View E-Book
      • Security vulnerability management tutorial

        SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

        View E-Book
      • Protecting against Web threats in the enterprise

        Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social networking policies.

        View E-Book
      Page 2 of 4
    • Page 1 of 1
      • Data encryption best practices

        Ever since Bank of America disclosed in 2005 that it lost a backup tape with customers’ personal data, nearly 80 other companies have reported similar embarrassing mishaps. These data breaches and new regulatory mandates are fueling the exploding interest in encryption. This exclusive e-book evaluates today's encryption technologies from all angles and projects trends to give you a complete picture of today's encryption landscape. Access this resource today.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Understanding governance, risk and compliance frameworks

        Governance, risk and compliance frameworks, tools, and strategies are essential to the success of today’s corporate information security programs. This in-depth e-book explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • NERC compliance strategies

        SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation. Get the latest tips and expert advice on NERC compliance in one place.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Technical guide to secure collaboration software

        TechTarget's Security Media Group presents a comprehensive guide to secure collaboration software. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype.

        View E-Book
      • Application security guide: Scanning production applications

        This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications, and get all of your toughest application security questions from experts.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Log management best practices for enterprises

        Are you bound to regulations? Then you’re no stranger to log management, and the importance of analyzing the reams of data your devices produce. Log management is covering several important aspects of network security. The four major chapters of this e-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more about the latest log management best practices for enterprises.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • IT decision center: Endpoint security

        While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it's probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major endpoint players do a fairly good job at detecting traditional virus attacks. But more importantly, endpoints aren’t only about antivirus anymore.

        Endpoint protection uses tools like behavioral analysis, host-based intrusion prevention systems (HIPS), patch and configuration management, whitelisting, network access control and data loss prevention. Increasingly, these tools are deployed as part of a single-vendor suite, which, on the one hand, narrows the field, but on the other makes it difficult to make meaningful side-by-side comparisons. In this series, we take an independent look at the options in order to help you focus on your particular priorities, consider product and solution features that can help implement endpoint security and close with advice on how to make the final buying decision.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Technical guide to secure development practices

        When security practitioners attempt to introduce secure development practices into a development process and organization, they are typically less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in your organization.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Technical guide on PCI: Global compliance trends

        TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI global compliance.

        View E-Book
      • PCI DSS: Next-generation data security, storage and integrity

        SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard. We have the latest PCI DSS advice and best practices from experts in this guide. Check it out today to get all of your PCI DSS questions answered.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Software as a Service: Top things to know when moving to SaaS

        Tough economic times are forcing some organizations to take a closer look at Software as a Service (SaaS). But does SaaS have the speed and security you need? Check out this expert e-book and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Combatting emerging Web threats In the enterprise

        Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at emerging Web threats and vulnerabilities, and how to protect your organization against them.

        View E-Book
      • Mitigation and detection to reduce the threat of online crime

        As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this e-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more about how to reduce the threats of online crime, and get tips and techniques from our experts. Access this resource today.

        View E-Book
      • Threat management in the enterprise: An essential guide

        Check out this expert e-book and get expert advice that can help your company successfully improve its threat management posture. Get the latest advice on threat management in your enterprise, advice from experts, and the latest best practices. Get your toughest questions answered in this e-book about threat management strategies.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Guide to managing identities and access control

        SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Unified threat management: What UTM product fits your organization?

        Companies are increasingly finding attractive the idea of unified threat management (UTM) systems, and vendors are responding with a range of products. Originally, smaller companies were the logical adopters of UTM technology, but now even giant enterprises see ways that large-scale UTM makes sense. If you think UTM might be in your company's future, there are several factors to consider, including how the product incorporates various security elements, the scale of its deployment and whether it should be hardware or a virtual product.

        This IT Decision Center outlines critical questions you must ask when considering a UTM product and provides insight on what UTM features will best meet your requirements. It also challenges UTM vendors to clarify what their particular products offer.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Virtualization security strategies in action

        Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this e-book and discover how to mitigate the inherent security risks associated with the adoption of virtualization security. In this e-guide, get your biggest virtualization security questions answered by experts. You'll also discover the most common pitfalls to avoid when adopting virtualization, and how to avoid them.

        View E-Book
      •  
      Page 1 of 1