Resource Library

Resources Whitepapers

IDC Findings on Combining Data, Context and Expertise to Optimise Threat Intelligence.

Threat intelligence is one of the primary trends within the broad cyber security market. Yet it is one of the least well understood, and many companies have experienced poor results with their deployments as a result of insufficiently scoped and defined programmes.


Microsoft’s New Tablet

SecureData carried out a research survey to gauge the reaction of 100 senior IT managers to the introduction of Microsoft’s Surface tablet, including which features are thought to be the most effective, those that are least desirable, and whether the Surface brings security risks.


The Future of the Workforce

2012 saw the first 4G mobile network launched in the UK and was followed by an influx of 4G-enabled devices. But how will this improved access impact businesses and remote working? Are IT departments prepared for the security risks it could bring? SecureData surveyed IT managers across the UK to find out.


Choosing The Right Firewall

Firewalls have evolved rapidly since the original days of the port 80 filter. They now include next generation firewall (NGFW) or unified threat management (UTM) functionality, remote access capabilities, intrusion prevention and other advanced features. Find out how to make the right choice for your business.


EU General Data Protection

UK enterprises are facing a major new compliance challenge in the shape of the EU’s General Data Protection Regulation. SecureData commissioned independent research to gauge the reaction of IT managers, and how ready they are to meet these new requirements.


A Complete Approach to Security

We know security is changing. It’s time for a different approach. IT leaders must enable their customers to use the Internet, cloud computing and business applications to their full potential in a secure way. In this whitepaper, we explore why a holistic approach to security is the answer.


How Can Security-as-a-Service Serve You?

Migration to the cloud is happening across all businesses, but Security-as-a-Service demands a trusted partner that can deliver on its promises. In this whitepaper, SecureData takes the pulse of IT managers when it comes to security outsourcing.


Demystifying Threat Intelligence

Threat Intelligence has become a buzzword, a term that seemingly holds the key to defending against tomorrow’s attacks. But what is meant by “Threat Intelligence”, and how does it differ from Security or Cyber Intelligence? Find out in this whitepaper.