Information Security Policies White Papers

(View All Report Types)
How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
sponsored by IBM
WHITE PAPER: This guide discusses security leaders' top concerns with today's aggressive threat landscape.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Unified Communications Security
sponsored by NextPlane
WHITE PAPER: This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

NextPlane

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ