Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Security > Security Applications

Browse through our extensive list of free Security Applications magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

BAE Systems Business Defense The evolution from cyber security to business defense...
Ransomware Hostage Rescue Manual for IT Pros This manual is packed with actionable info that you need to prevent infections, and what to do..
Campus Safety: Access Control and Visitor Management Systems are Vital Learn how access control can help you achieve a more secure campus...
Your Money or Your Files! A Short History of Ransomware and Countermeasures This white paper provides a history of ransomware and what to do..
Health Management Technology Has been the Source for Healthcare Information Systems Solutions since 1980...
Eight Key Pressures on Security Operations Identify key pressures and regain control of your security operations...
How to Deal with Stealthier Phishing and Malware Attacks Learn key IT Security best practices like how users can be mobilized as your first..
Employees at the Frontline in the Battle Against Ransomware The recent escalating ransomware attacks have shown that no organization is safe..
How to Transform Employee Worst Practices Into IT Security Best Practices Get clear direction on how to improve your organization's security..
Cryptographic Storage Cheat Sheet This cheat sheet provides a simple model to follow when implementing solutions for data at rest...
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
The Cyber Security Playbook: What Every Board Of Directors Should Know Before, During, And After An Attack. This playbook is a starting..
Aberdeen Group: Selecting Encryption for 'Data at Rest' in Back-End Systems What risks are you trying to address?..
The Numbers Game: How Many Alerts is too Many to Handle? This report details the survey results of all aspects of alert management -..
NAC at the Endpoint: Control Your Network Through Device Compliance Learn why NAC at the endpoint is the most effective way to manage who..
How to Attain PCI Compliance Learn how eEye Digital Security can help you audit for and comply with the PCI Standard Security Standard...
Cybersecurity: A Small Business Guide An overview of everything you need to know to protect yourself and your business...
The State of Resilience & Optimization on IBM Power Systems (System i and System p) Read this review to learn the data protection, recovery..
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
The Problem with Privileged Users: What You Don't Know Can Hurt You Do you know where data leaks really come from? Download this paper to..
Protecting Enterprise Data on the Endpoint: A Strategic Approach Ensure Data Protection on Laptops, Smartphones & Memory Sticks...
2016 Annual Online Fraud Benchmark Report Fraud management is a challenging balancing act in our increasingly complex and competitive..
QTS Data Security Secures Sensitive Data in the Cloud QTS Data Security -- Securing data-at-rest more effectively than full disk encryption,..
The Business Case for Protecting Against Advance Attacks: Demonstrating the ROI of FireEye as a Service to Non-Technical Executives This..
Solving the Password Management Paradox: Defining the Problem and Reviewing the Four Best-Known Solutions Discover how to solve the need for..
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
Could Your Business Survive a Cryptor? Lean how to guard against crypto-ransomware...
11 Security Solutions for Small Business Here are 11 small-business-friendly cybersecurity solutions to get you started on protecting your..
Schrodinger Helps Pharmaceutical Researcher Make Breakthroughs Sooner with the Help of AWS Find out why Schrodinger turned to Amazon Web..
Securing Hadoop: Security Recommendations for Hadoop Environments This research paper lays out a series of recommended security controls for..
Top Five Recommendations for Encrypting Laptop Data Learn how to protect laptop data from loss or theft, and save on storage and IT..
BYOD Risks and Rewards Whether you're an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the..
How a Cyber Threat Group Exploited Governments and Commercial Entities for Over a Decade This special report is a starting point to help an..
Human Vulnerabilities in Our Current Threat Landscape Discover how the current threat landscape pertains to human vulnerabilities and how to..
Authentication Cheat Sheet Excellent authentication guidance in an easy to read format..
Adding Value Research Brief for Affinity Organizations The more information people share online, the more they have at risk...
5 Things You Need to Know about Security and UC The decision to invest in new technology should never be taken lightly...
Endpoint Security Strategies: Part II Aberdeen Group's endpoint data protection benchmark report identifies successful strategies,..
How To Cost-Effectively Manage The Security of Your Company's IT Infrastructure A growing number of small and medium sized businesses, with..
30 Steps to a Secure Organization: A No Nonsense Approach to Objectively Evaluating Your Information Security 30 Steps to a Secure..
IT Leaders: Have You Done Everything You Can to Prevent a Data Breach? The fact is, today, if you're not on offense, you're on defense in..
Is Security too Risky to Outsource? Security is persistently top of mind for IT and business leaders because there is so much at stake. Can..
Testing and Debugging Distributed Applications Learn why distributed systems, both large and small, can be extremely challenging to test and..
Secure and Control Data across All Mobile Endpoints Learn how CREDANT's Mobile Guardian Enterprise solution delivers advanced mobile data..
IT Guide to Mac Backup for Business How to Include Macs in Your Laptop Backup and Data Protection Plans...
Top Security Predictions for 2016 This year is crucial as we expect the size, severity and complexity of cyber threats to continue to..
Security Intelligence: Information Sharing Strategies Using Trusted Collaboration Human-source Intelligence (HUMINT) has been used for..
Close Your Security Gaps with Advanced Threat Protection Learn how adding a layer in the cloud can help close your security gaps...
Best Practices for Handling a Data Breach It only takes one stolen laptop, one employee's USB stick, one hacker, one virus, or one careless..
Practical Guide to IT Security Breach Prevention Part II Learn how to reduce mobile, web and social media risks from a security breach...
After A Data Breach: Managing Identity Theft Effectively Life can seem surreal for identity victims...
Debunking the Top 5 Security Implementation Myths Even if they know their companies' current security solution isn't effective, many IT..
Secure Corporate Data with Policy-Based Intelligent Encryption Hear about CREDANT's next-generation encryption solution, offering better..
Resilience & Optimization on IBM Power Systems: Surveys of IBM i and AIX Users Read this review of the data protection and recovery..
Enterprise Security for Financial Services As commerce moves online to realize cost-savings and efficiency gains, financial services become..
High Availability on IBM System i (AS/400) - An Introduction Get more value out of your business-critical AS/400 and iSeries systems!..
Contractor Access: Mitigating Security and Risk Issues Having contractors doesn't have to mean increased risk...
The 2016 Bad Bot Landscape Report Learn about the industry's most in-depth analysis about the sources, types, and sophistication levels of..
IDC Spotlight: Access Control and Certification Read this brief for best practices on managing user access compliance...
Storage Source Magazine This newly premiered publication is a one-stop source for storage strategies and management, offered exclusively by..
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
Why the Threat of Downtime Should Be Keeping You Up at Night Learn how to easily protect your security systems and keep them running 24/7...
The CISO's Guide to Machine Learning and UBA A Technical Resource for Security Professionals...
Debunking the Top 5 Security Implementation Myths Even if they know their companies' current security solution isn't effective, many IT..
Mobile Security: More than Just Encryption Outlines four key requirements for implementing an effective and flexible enterprise-class mobile..
NAC 2.0: A New Model for a More Secure Future Learn why NAC 2.0 is the future of Network Access Control...
Five Reasons Why Smaller Organizations Should Consider System i (AS/400) High Availability Learn why true High Availability and Disaster..
Next-Generation Disaster Recovery and Availability Technologies for AIX and IBM i (i5/OS) on IBM Power Systems Review the technology..
Using Micro-Segmentation to Make Cybersecurity Work Learn why micro-segmentation is the great security hope that will allow your..
Achieving Rapid Data Recovery for IBM AIX Environments Read how EchoStream for AIX leverages CDP technology to support instantaneous..
Ensuring Immediate and Appropriate User Access in the Healthcare Industry Learn how Children's Hospital Boston used security management..
Viruses, Spyware, Malware, etc. Explained: Understanding Online Threats By downloading this free guide, you agree to receive regular updates..
The Benefits of AIX Data Replication in HACMP Clusters Learn How to Protect the Data as Well as the Server with Real-Time Data Replication...
LifeLock Affinity Program Partners Guide Your members are your business...
Narrowing the Security Gap with Automated Configuration Assessment Learn how to ensure the safety of sensitive data and IT while meeting..
Compromised Users and Hosts - Detection with Behavioral Analytics Attacks involving compromised users and hosts are notoriously difficult to..
An Innovative Approach to Protecting Critical Data Learn how to protect critical data by concealing network endpoints and assets from..
Oracle Product Brief: Oracle Identity & Access Management Suite & Oracle Database Security Why your organization needs identity and access..
Who Leads in WLAN Security? Comparative evaluation of vendor offerings and positioning in the WLAN security market, including security issue..
A Comprehensive Mobile Threat Assessment Find out what FireEye researchers uncovered when they analyzed more than 7 million iOS and Android..
Getting Started with Java EE Security This Refcard will provide you with an in-depth introduction to Java EE Security, which supports a fine..
How to Make a Case for Investing in an Integrated Cyber Security Platform This white paper demonstrates the ROI of FireEye as a Service to..
Next-Generation Disaster Recovery and Availability Technologies for AIX and IBM i (i5/OS) on IBM Power Systems Review the technology..
Payment Card Industry Compliance and Primary Response This white paper examines solutions to overcome Payment Card Industry (PCI)..
Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into their datacenters,..
Quantifying the Value of Software Asset Management Discover how a SAM solution can drive real benefits and cost savings to your organization...
IT Security Vendor Analysis by Bizety This paper examines 5 major vendors and outlines how their products can coordinate to successfully..
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
NAC: Managing Unauthorized Computers Learn how your enterprise can combat today's threats and still remain nimble enough for tomorrow's..
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
Best Practices for Access Certification Is your company using best practices to certify user access is in accordance with policy?..
Identity Theft Protection Adds Value to Your Service Offering This report distills key research findings about the services your members and..
Tune Fraud Rules Faster With Predictable Results. Read The eBook The pressures to effectively manage eCommerce fraud today are growing...
6 Modern Security Tools for Windows 8 By downloading this free guide, you agree to receive regular updates on the latest cool apps, product..
Want To Know Who's Trying To Unlock Your Phone? Catch Them In The Act By downloading this free guide, you agree to receive regular updates..
IxSecure: 360° Security Protection Security is much more than layers of defense...
Copyright © 2017 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices