Security White Papers

Solutionary offers white papers on a variety of security related issues including: malware analysis, DoS/DDoS, Advanced Persistent Threat (APT), and Managed Security System Providers (MSSP). Download your complimentary copies today.

Defense Strategies for Advanced Threats – Mapping the SANS 20 Critical Security Controls to the Cyber Kill Chain

August 27, 2015

If an advanced threat is detected before critical data is exfiltrated, the impact can be minimized. In this paper, Solutionary presents one approach to develop capabilities not only to prevent successful attacks, but also to detect attacks in progress.

Guide to Choosing a Security Assessor

January 27, 2015

Technical security assessments like: vulnerability scanning, penetration testing, application security assessments, infrastructure assessments and physical controls assessments help identify gaps and provide insight into an organization’s current security posture. This guide will uncover the key considerations to choosing a security assessment partner.

The MSSP Advantage

January 27, 2015

A CIO/CSO QuickPulse study reveals that leading edge organizations are turning increasingly to managed security service providers (MSSPs) to keep both hackers and malware at bay, as this insightful two-page white paper reveals.

Threat Intelligence Defined

January 19, 2015

The term “threat intelligence” rapidly emerged onto the information security landscape over the last several years, and many security vendors now offer threat intelligence services to customers. Learn how to tell what "intelligence" they're really offering in this Solutionary white paper.

Top-Down Security and Security Life Cycle

December 15, 2014

Understanding the motivations of IT security professionals and non-technical managers is key in the development of the organization's security infrastructure. Find out how to bridge the gap and create a hybrid security life cycle.

Malware Detection with Network Monitoring

October 10, 2014

While network monitoring is a valuable tool for detecting security incidents, using it as the sole means of malware detection is not a sound approach. Download this white paper to discover five real-world case studies that illustrate what does and doesn’t work in the detection and prevention of malware.

Health Care Organizations and the HIPAA Omnibus Rule

May 30, 2014

The HIPAA Omnibus Rule that went into effect on March 26, 2013 was over 500 pages. However, from a security or IT regulatory point of view, there are seven things an organization working with PHI needs to know.

Risks Associated with Missing Documentation for Health Care Providers

April 01, 2014

Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures. Download this white paper to understand what a proper risk assessment will do for you.

Risk Assessments for Health Care Providers

March 24, 2014

Download this white paper and consider the business implications of security issues and create a holistic approach that will provide actionable results for the business beyond the security and IT departments.

The Business Case for Managed Security Services

March 21, 2013

There are a lot of decisions to be made when evaluating Security Information and Event Management (SIEM) products vs. hiring a Managed Security Services Provider. This white paper looks at both options and explains when it makes sense to go with one option over the other.

Contextual Security Provides Actionable Intelligence

September 25, 2012

Just as context is key to understanding a concept, security data can also be enriched with contextual data to provide better understanding and actionable intelligence. Download this white paper to learn how.

How Malware Analysis Benefits Incident Response

September 07, 2012

See how actionable information from malware analysis can help an organization more effectively mitigate vulnerabilities exploited by malware and help prevent additional compromise.

In Denial?...Follow Seven Steps for Better DoS and DDoS Protection

April 25, 2012

DoS/DDoS attack capabilities today are more sophisticated, varied and potent. Organizations can’t afford to ignore these important steps for protecting themselves against DoS/DDoS attacks.

Defending Against Advanced Persistent Threats

February 06, 2012

Learn more about the resurgence of the APT and what your organization can do to help prevent future attacks.