Physical Security White Papers

(View All Report Types)
Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Unified network traffic monitoring for physical and VMware environments
sponsored by NetFort Technologies Ltd
WHITE PAPER: This white paper outlines an approach, based on monitoring network traffic, that delivers a unified view of network activity across virtual and physical components of the network.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

NetFort Technologies Ltd

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade

Achieving Financial and Functional Advantages in Connected Building Solutions with the Unified Physical Infrastructure℠(UPI)
sponsored by Panduit
WHITE PAPER: Read this paper to learn about being connected building planning requires tightly integrated, well-coordinated cross-functional communication and project management across four functional phases: organizational alignment, technology strategies, network design considerations, and financial analysis.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

The Unified Physical Infrastructure Approach
sponsored by Panduit
WHITE PAPER: In this paper, you'll learn that UPI-based solutions provide superior business value, helping customers keep pace with technology innovations and build a smarter, unified business foundation.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

Take a Holistic Approach to Business Driven Security
sponsored by IBM
WHITE PAPER: Read this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata