Using client reputation to intelligently defend your web applications

A Web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. This intelligence allows organisations to forecast intent and protect applications against Distributed Denial of Service and application layer attacks.

Uncovering the threat: Uniting network and endpoint security for unmatched threat defence

When network and endpoint security solutions team up, the result is a strengthened security posture and full lifecycle solution to combat advanced threats.

Managing workforce mobile use

As employees increasingly have mobile access to the corporate network this webinar will discuss the steps organisations can take to minimise risk among their workforce and detail what a mobile device management policy should look like and how to enforce it.

Can a certificate improve security?

Security is a term commonly used in today's market place, but not all security is made equal. For many organisations, and for many vendors, security can mean many different things. Over the past few years a number of well known brands and institutions have been breached despite having had a high level of assurance that their corporate security was more than good enough.

Safeguarding the data when going mobile

Data security - at rest, on the device, on the server, or in transit - and the access to data on the network via mobile device, and potentially "Malicious mobile apps." We focus on the challenges and practical solutions.

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today's advanced threats.

What mobile policy suits your organisation?

When should you ban personal mobile use? Is Choose your own device appropriate, or can you safely harness the cost savings of Bring Your Own Device? What about wearable technology? Is the issue the device, or the framework within which devices are used? Can security be moved to the data itself to minimise the impact of the access device? It depends what you want to protect and why. We look at the options and selection criteria.


Disrupting the threat: Respond, contain and recover in seconds

As adversaries continue to innovate—designing attacks specifically tailored for your enterprise—being able to respond, contain and recover in a timely manner has never been harder. Many response solutions were developed for opportunistic attacks that operate at scale, not advanced threats targeting a subset of high-risk endpoints in your organization.

Five great reasons to embrace mobile in the enterprise.

Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions. Is corporate data secure?

2015: The Year of Securing Big Data and Cloud Environments

2015 will mark a pivotal year in the adoption of Big Data and Cloud within the enterprise. Critical to embracing this approach will be securing data in these environments. Questions such as access by 3rd party cloud providers to your data and the sharing of sensitive information within Big Data environments, need to be effectively addressed.

What you need to know about securing access to your private cloud

Moving enterprise apps to the cloud is becoming a very attractive option for organisations striving to cut IT costs while improving agility and scalability. However, before making this move there is a lot to consider - What applications are you going to move? Are you planning to move them to Amazon Web Services™ (AWS), Microsoft® Azure or Google Cloud? How are you going to secure applications in the cloud?

Mitigating employee risk - keep hires from starting fires

Employees are an organisation's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data. Finding the balance between trust and scrutiny/control represents a tremendous challenge and a huge opportunity if executed correctly. Most organisations use intense pre-hire screening background checks to ensure they are bringing in valuable talent that will benefit the organisation without the propensity to do harm. Once the employee is hired they are given the "keys to the castle" to do great things for their new employer....or they could cause great damage.