Security Best Practices White Papers

(View All Report Types)
The NSA Scandal’s Impact on the Future of Cloud Security Data Security and Protection in the Wake of the Spying Scandal
sponsored by Porticor Cloud Security
WHITE PAPER: This important resource discusses the light that the NSA scandal has shined on security in the cloud and examines what steps your organization can take to ensure that your cloud data is kept private and secure.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Porticor Cloud Security

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite

Incorporating Authentication with Imaging and Printing Devices to Improve Data Protection
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This exclusive paper discusses a security solution that helps protect your company's confidential information and control printing access by requiring users to authenticate at your imaging and printing devices with your existing proximity cards.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Hewlett-Packard Enterprise

Policy-based Compliance Protects Enterprise Imaging and Printing Data
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Hewlett-Packard Enterprise

Choosing a partner for enterprise cloud production workloads
sponsored by IBM
WHITE PAPER: Despite initial hesitancy, companies of all sizes are considering moving their enterprise-class applications to the cloud. This whitepaper provides a checklist for choosing the right managed third-party provider for your business.
Posted: 17 Oct 2013 | Published: 01 May 2013

IBM

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
sponsored by IBM
WHITE PAPER: This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

IBM

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix Systems, Inc.
WHITE PAPER: This exclusive white paper discusses a set of mobile tools from industry titan Citrix that provide a complete, integrated and scalable solution to deliver applications and data to any device with full security and a high-performance user experience.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

Citrix Systems, Inc.

Three Ways to Prevent USB Insecurity
sponsored by Lumension
WHITE PAPER: This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

The BlackBerry 10 Ready Program: Everything You Need in One Place
sponsored by BlackBerry
WHITE PAPER: This informative white paper examines the latest next-gen Enterprise Mobility Management (EMM) solution that delivers an enhanced and streamlined end-user experience without sacrificing corporate security or manageability.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

BlackBerry

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Cutting Complexity – Simplifying Security
sponsored by Kaspersky
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013

Kaspersky

Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Core Security Technologies

Building An Intelligence - Driven Security Operations Center
sponsored by EMC Corporation
WHITE PAPER: Access this white paper for insider tips on rapid cyber threat detection and remediation as well as how to coordinate technologies, personnel, and processes for better security.
Posted: 26 Sep 2013 | Published: 28 Feb 2013

EMC Corporation

The Mobile Trust Gap
sponsored by MobileIron
WHITE PAPER: This important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

MobileIron

MobileIron for Android
sponsored by MobileIron
WHITE PAPER: This exclusive resource examines a mobile management solution that is designed specifically to securely support Android devices, applications and data. Read on to learn how this can help streamline your security and mobile management.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

MobileIron

Multi-user for Shared iOS Devices
sponsored by MobileIron
WHITE PAPER: This informative white paper discusses a mobile management solution that can delivers secure device and application management, supporting multi-OS devices and sharing them across multiple users to simplify the management of your overall mobile environment.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

MobileIron

AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER: This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

MobileIron

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Simplify and Consolidate Data Protection for Better Business Results
sponsored by IBM
WHITE PAPER: This informative resource examines a tool that provides advanced visualization, built-in analytics and integrated workflow automation features that dramatically simplify backup administration to streamline problem resolution and simplify data protection.
Posted: 10 Sep 2013 | Published: 10 Sep 2013

IBM

Ensuring Application Security in Mobile Device Environments
sponsored by IBM
WHITE PAPER: This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

IBM

Computer Weekly special report: Mobile device management and the importance of absolute compliance
sponsored by BlackBerry
WHITE PAPER: Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

BlackBerry

Secure workspace for iOS and Android
sponsored by BlackBerry
WHITE PAPER: As more mobile devices enter the workspace, it can be difficult for organisations to manage applications and security across multiple platforms. Secure Work Space, a new offering for BlackBerry Enterprise Service 10, offers containerisation, application wrapping and secure connectivity for iOS and Android devices. Learn how.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

BlackBerry

Crucial Enterprise Endpoint Backup Requirements
sponsored by Code42
WHITE PAPER: This crucial paper provides a helpful checklist of the requirements an enterprise endpoint backup strategy needs to satisfy in order to properly and successfully protect the data stored on your endpoints.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Code42

Multi-Platform Enterprise Mobility Management: Perfectly balancing end-user and corporate needs
sponsored by BlackBerry
WHITE PAPER: Mobile users are happy users—but how can an organisation effectively balance meeting user demands with looking out for the company? Learn how an enterprise mobility management solution like BlackBerry Enterprise Service 10 can help businesses walk that line, by bringing together device management, security, unified communications and applications.
Posted: 22 Aug 2013 | Published: 22 Aug 2013

BlackBerry