Solutionary offers white papers on a variety of security related issues including: malware analysis, DoS/DDoS, Advanced Persistent Threat (APT), and Managed Security System Providers (MSSP). Download your complimentary copies today.
October 08, 2014
While network monitoring is a valuable tool for detecting security incidents, using it as the sole means of malware detection is not a sound approach. Download this white paper to discover five real-world case studies that illustrate what does and doesn’t work in the detection and prevention of malware.
May 30, 2014
The HIPAA Omnibus Rule that went into effect on March 26, 2013 was over 500 pages. However, from a security or IT regulatory point of view, there are seven things an organization working with PHI needs to know.
April 01, 2014
Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures. Download this white paper to understand what a proper risk assessment will do for you.
March 24, 2014
Download this white paper and consider the business implications of security issues and create a holistic approach that will provide actionable results for the business beyond the security and IT departments.
March 21, 2013
There are a lot of decisions to be made when evaluating Security Information and Event Management (SIEM) products vs. hiring a Managed Security Services Provider. This white paper looks at both options and explains when it makes sense to go with one option over the other.
September 25, 2012
Just as context is key to understanding a concept, security data can also be enriched with contextual data to provide better understanding and actionable intelligence. Download this white paper to learn how.
September 07, 2012
See how actionable information from malware analysis can help an organization more effectively mitigate vulnerabilities exploited by malware and help prevent additional compromise.
April 25, 2012
DoS/DDoS attack capabilities today are more sophisticated, varied and potent. Organizations can’t afford to ignore these important steps for protecting themselves against DoS/DDoS attacks.
February 06, 2012
Learn more about the resurgence of the APT and what your organization can do to help prevent future attacks.