Magazine Button

Whitepapers

The latest Whitepapers can be found below, if you are looking for something specific, please select the company from the drop down menu below to view their Whitepapers.

AEM

Ensuring Cable Readiness for IoT Deployments

NEW

Ensuring Cable Readiness for IoT Deployments

Alcatel-Lucent Enterprise

Hospital of the Future

NEW

Hospital of the Future

BlackBerry

Why SMBs must prioritise a prevention-first approach to security

NEW

Why SMBs must prioritise a prevention-first approach to security

BlueFort Security

Intelligence-led Cyber Visibility

NEW

Intelligence-led Cyber Visibility

Check Point

Unifying the best security with optimized connectivity

NEW

Unifying the best security with optimized connectivity

Must-haves for a secure SD-WAN solution

NEW

Must-haves for a secure SD-WAN solution

Check Point 2023 Cyber Security Report

NEW

Check Point 2023 Cyber Security Report

F5

Getting to Know the F5 Distributed Cloud Platform

NEW

Getting to Know the F5 Distributed Cloud Platform

Creating the New WAF Boundary

NEW

Creating the New WAF Boundary

Applying the Easy Button for API Security

NEW

Applying the Easy Button for API Security

Protecting Applications against DDoS Attacks

NEW

Protecting Applications against DDoS Attacks

Blocking Automated Threats and Smart Bots

NEW

Blocking Automated Threats and Smart Bots

Decentralising WAAPaaS with Customer Edge

NEW

Decentralising WAAPaaS with Customer Edge

Fortinet

How To Achieve Secured Wired and Wireless Networks

NEW

How To Achieve Secured Wired and Wireless Networks

Grow Business with Secure Hybrid and Hyperscale Data Centers

NEW

Grow Business with Secure Hybrid and Hyperscale Data Centers

How to Achieve Optimal Internal Segmentation with FortiGate NGFWs and the Fortinet Security Fabric

NEW

How to Achieve Optimal Internal Segmentation with FortiGate NGFWs and the Fortinet Security Fabric

Fortinet Delivers the Most Flexible SASE Solution

NEW

Fortinet Delivers the Most Flexible SASE Solution

Exploring Transformation and Trust in the Digital Era: Part 1

NEW

Exploring Transformation and Trust in the Digital Era: Part 1

Exploring Transformation and Trust in the Digital Era: Part 2

NEW

Exploring Transformation and Trust in the Digital Era: Part 2

Exploring Transformation and Trust in the Digital Era: Part 3

NEW

Exploring Transformation and Trust in the Digital Era: Part 3

Netwitness

Towards the NIS 2 Directive: The New Frontier of Cybersecurity

NEW

Towards the NIS 2 Directive: The New Frontier of Cybersecurity

OKTA

Have passwords really had their day?

NEW

Have passwords really had their day?

Palo Alto Networks

Protect Kubernetes Environments with CN-Series Firewalls

NEW

Protect Kubernetes Environments with CN-Series Firewalls

2022 Award Write Up Palo Alto Networks SD WAN Award

NEW

2022 Award Write Up Palo Alto Networks SD WAN Award

Zero Trust Network Access For Dummies

NEW

Zero Trust Network Access For Dummies

Five Key Challenges in Private Cloud Security

NEW

Five Key Challenges in Private Cloud Security

Start Your SASE Journey with Cloud SWG

NEW

Start Your SASE Journey with Cloud SWG

From the Node Up: The Complete Guide to Kubernetes Security

NEW

From the Node Up: The Complete Guide to Kubernetes Security

A 2022 Gartner® Customers’ Choice for SSE

NEW

A 2022 Gartner® Customers’ Choice for SSE

Behind the need for next-generation sd-wans

NEW

Behind the need for next-generation sd-wans

The Total Economic Impact™ Of Palo Alto Networks VM-Series Virtual Firewalls

NEW

The Total Economic Impact™ Of Palo Alto Networks VM-Series Virtual Firewalls

Driving the future of work through enterprise-wide SASE

NEW

Driving the future of work through enterprise-wide SASE

ESG Top Ten Considerations for Your Next-generation SD-WAN

NEW

ESG Top Ten Considerations for Your Next-generation SD-WAN

How Six Organizations Transformed Their Networking and Security with Prisma SASE

NEW

How Six Organizations Transformed Their Networking and Security with Prisma SASE

Go Beyond Remote-Access VPN Protect mobile workforces with Prisma™ Access

NEW

Go Beyond Remote-Access VPN Protect mobile workforces with Prisma™ Access

The SSE Journey Starts with ZTNA

NEW

The SSE Journey Starts with ZTNA

Software Supply Chain Security Checklist

NEW

Software Supply Chain Security Checklist

The 10 Tenents of an Effective SASE Solution

NEW

The 10 Tenents of an Effective SASE Solution

Raising the Bar for Web Application and API Security Solutions

NEW

Raising the Bar for Web Application and API Security Solutions

Why Prisma SD-WAN is the solution youve been looking for

NEW

Why Prisma SD-WAN is the solution youve been looking for

Elevating SASE Security: What’s New in Prisma Access

NEW

Elevating SASE Security: What’s New in Prisma Access

Container Security 101

NEW

Container Security 101

From the Node Up: The Complete Guide to Kubernetes Security

NEW

From the Node Up: The Complete Guide to Kubernetes Security

ZTNA 2.0 The New Standard for Securing Access

NEW

ZTNA 2.0 The New Standard for Securing Access

ZTNA for dummies

NEW

ZTNA for dummies

O’Reilly Cloud Native Security Cookbook – Recipes for a Secure Cloud

NEW

O’Reilly Cloud Native Security Cookbook – Recipes for a Secure Cloud

Guide to Cloud Security Posture Management Tools

NEW

Guide to Cloud Security Posture Management Tools

The Total Economic Impact Of Palo Alto Networks Prisma Cloud

NEW

The Total Economic Impact Of Palo Alto Networks Prisma Cloud

Cloud native Security Maturity: Using Security to Drive Software Development Efficiency

NEW

Cloud native Security Maturity: Using Security to Drive Software Development Efficiency

Proofpoint

Cloud Account Compromise and Takeover

NEW

Cloud Account Compromise and Takeover

The 2022 Ransomware Survival Guide

NEW

The 2022 Ransomware Survival Guide

Metrics That Matter: The CISO’s Guide to Assessing, Prioritizing and Justifying Cybersecurity Budgets That Make Business Sense

NEW

Metrics That Matter: The CISO’s Guide to Assessing, Prioritizing and Justifying Cybersecurity Budgets That Make Business Sense

Supply Chain Attacks

NEW

Supply Chain Attacks

2023 State of the Phish: Europe and the Middle East

NEW

2023 State of the Phish: Europe and the Middle East

2023 State of the Phish: Europe and the Middle East

NEW

2023 State of the Phish: Europe and the Middle East

Phish in a Barrel – What users don’t know about cyber threats — and why it can hurt them ebook

NEW

Phish in a Barrel – What users don’t know about cyber threats — and why it can hurt them ebook

The Business Email Compromise (BEC) Handbook

NEW

The Business Email Compromise (BEC) Handbook

Recorded Future

Digital Asset Management in an Expanding Attack Surface

NEW

Digital Asset Management in an Expanding Attack Surface

The Top Threats Targeting Your Brand: Domain Abuse and Its Impact on Trust

NEW

The Top Threats Targeting Your Brand: Domain Abuse and Its Impact on Trust

VMware

CIO Essential Guidance: CISO Security Threat landscape

NEW

CIO Essential Guidance: CISO Security Threat landscape

Browse our latest issue

Intelligent CISO

View Magazine Archive