Solutionary offers white papers on a variety of security related issues including: malware analysis, DoS/DDoS, Advanced Persistent Threat (APT), and Managed Security System Providers (MSSP). Download your complimentary copies today.
December 01, 2015
Review an interesting analysis of an ISMG survey done with approximately 250 respondents in the healthcare industry. This study gives an overview of the survey results and responds with recommendations to healthcare industry professionals.
December 01, 2015
Incident response plans can be broken down in to four different approaches. Download this executive brief to see where your organization falls and find ways to improve your security infrastructure.
October 05, 2015
Looking for best practices when it comes to writing an RFP? Not sure what you should be looking for in an MSSP? This white paper delivers answers to both dilemmas. Get your copy today.
August 27, 2015
If an advanced threat is detected before critical data is exfiltrated, the impact can be minimized. In this paper, NTT Security presents one approach to develop capabilities not only to prevent successful attacks, but also to detect attacks in progress.
January 27, 2015
Technical security assessments like: vulnerability scanning, penetration testing, application security assessments, infrastructure assessments and physical controls assessments help identify gaps and provide insight into an organization’s current security posture. This guide will uncover the key considerations to choosing a security assessment partner.
January 27, 2015
A CIO/CSO QuickPulse study reveals that leading edge organizations are turning increasingly to managed security service providers (MSSPs) to keep both hackers and malware at bay, as this insightful two-page white paper reveals.
January 19, 2015
The term “threat intelligence” rapidly emerged onto the information security landscape over the last several years, and many security vendors now offer threat intelligence services to customers. Learn how to tell what "intelligence" they're really offering in this white paper.
December 15, 2014
Understanding the motivations of IT security professionals and non-technical managers is key in the development of the organization's security infrastructure. Find out how to bridge the gap and create a hybrid security life cycle.
October 10, 2014
While network monitoring is a valuable tool for detecting security incidents, using it as the sole means of malware detection is not a sound approach. Download this white paper to discover five real-world case studies that illustrate what does and doesn’t work in the detection and prevention of malware.
May 30, 2014
The HIPAA Omnibus Rule that went into effect on March 26, 2013 was over 500 pages. However, from a security or IT regulatory point of view, there are seven things an organization working with PHI needs to know.
April 01, 2014
Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures. Download this white paper to understand what a proper risk assessment will do for you.
March 24, 2014
Download this white paper and consider the business implications of security issues and create a holistic approach that will provide actionable results for the business beyond the security and IT departments.
March 21, 2013
There are a lot of decisions to be made when evaluating Security Information and Event Management (SIEM) products vs. hiring a Managed Security Services Provider. This white paper looks at both options and explains when it makes sense to go with one option over the other.
September 25, 2012
Just as context is key to understanding a concept, security data can also be enriched with contextual data to provide better understanding and actionable intelligence. Download this white paper to learn how.
September 07, 2012
See how actionable information from malware analysis can help an organization more effectively mitigate vulnerabilities exploited by malware and help prevent additional compromise.
April 25, 2012
DoS/DDoS attack capabilities today are more sophisticated, varied and potent. Organizations can’t afford to ignore these important steps for protecting themselves against DoS/DDoS attacks.
February 06, 2012
Learn more about the resurgence of the APT and what your organization can do to help prevent future attacks.