Network Security White Papers

(View All Report Types)
Taming the Integration Nightmares of a 1,000 App Enterprise
sponsored by Palo Alto Networks
WHITE PAPER: Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014

Palo Alto Networks

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary
sponsored by IBM
WHITE PAPER: As cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.
Posted: 23 Dec 2013 | Published: 31 Jan 2012

IBM

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 13 Dec 2013 | Published: 31 Dec 2013

Global Knowledge

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

Top 10 Considerations for Deploying Lync on Smartphones and Tablets
sponsored by Aruba Networks
WHITE PAPER: Microsoft Lync is becoming an increasingly important part of enterprise telephony by offering a more collaborative interaction. This brief guide outlines the top ten considerations for deploying Microsoft Lync on smartphones and tablets.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Aruba Networks

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: As the trend towards data center automation continues, network monitoring becomes increasingly important when optimizing your network. In this white paper, they will explore the data center automation and its importance to company performance and efficiency.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Integrating security with HP TippingPoint
sponsored by HP & Intel®
WHITE PAPER: Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance.
Posted: 22 Nov 2013 | Published: 30 Nov 2012

HP & Intel®

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID Global
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID Global

Sample Corporate Mobile Device Acceptable Use and Security Policy
sponsored by Wisegate
WHITE PAPER: In this exclusive white paper, gain insight on how senior-level IT security professionals have approached the bring-your-own-device (BYOD) trend thus far, and which strategies have led to success or failure.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Wisegate

Making the Most of BYOD Opportunities
sponsored by Dell and VMware
WHITE PAPER: Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.
Posted: 11 Nov 2013 | Published: 30 Apr 2013

Dell and VMware

What is an Application Delivery Controller (ADC)?
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper details how application delivery controllers can help ensure the performance of your applications.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

Citrix Systems, Inc.

Malicious Mobile Apps
sponsored by OpenText Security Solutions
WHITE PAPER: In this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.
Posted: 15 Oct 2013 | Published: 14 Jun 2013

OpenText Security Solutions

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
sponsored by Azzurri
WHITE PAPER: This resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Azzurri

Enterprise Networks: Four of the Top Trends
sponsored by Azzurri
WHITE PAPER: In this white paper, unveil the top 4 trends in enterprise networking for 2014, and use these as guidelines in your network management planning for next year.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Azzurri

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
Posted: 30 Sep 2013 | Published: 31 Dec 2011

GeoTrust, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.