We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

IT White Papers

Security white papers

How integrated services reduce risk and the impact of a security breach to organisations

Accelerating Incident Response

Date: 31/03/14

Company: Dell SecureWorks

Download now

10 tips to help you minimise the duration and impact of a security breach

Help IT and IT security organisations minimise the duration and impact of a security breach.

Date: 31/03/14

Company: Dell SecureWorks

Download now

7 key questions to ask when selecting an incident response service provider

This paper is designed to help you ask tough, direct questions of any Incident Response services provider to help you determine the vendor’s capabilities

Date: 31/03/14

Company: Dell SecureWorks

Download now

Advantages of managed security services vs. in-house security information management (SIM)

Leveraging Dell SecureWorks for global Managed Security Services will help manage the risks to your IT assets in an efficient, costeffective fashion

Date: 31/03/14

Company: Dell SecureWorks

Download now

Lifecycle of an Advanced Persistent Threat

Good architecture can help with controlling data flows

Date: 31/03/14

Company: Dell

Download now

Prescribing enhanced security and worldwide compliance

Pharmaceutical firm in the UK expands business and meets complex international compliance regulations with 24/7 in-depth security

Date: 31/03/14

Company: Dell

Download now

Cybercrime survival guide

Almost 400 million people fall victim to cybercrime every year, don't be one of them

Date: 25/03/14

Company: Symantec

Download now

12 Things Effective Intrusion Prevention Systems Should Do

Making the right choice in selecting an intrusion prevention system

Date: 18/03/14

Company: Dell

Download now

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems

Sophisticated exploits that utilize advanced evasion techniques are all too common

Date: 18/03/14

Company: Dell

Download now

5 Things You Didn't Know About Cloud Backup

Data privacy can easily be compromised by encryption key holders

Date: 13/03/14

Company: Druva

Download now


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open