Security Policies White Papers

(View All Report Types)
Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Palo Alto Networks in the Data Center: Eliminating Compromise
sponsored by Palo Alto Networks
WHITE PAPER: This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012

Palo Alto Networks

Building a Disaster Ready Infrastructure
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This white paper explores the factors surrounding a well implemented disaster recovery/business continuity plan that will ensure minimal impact to your organization. Read now to find out how you can prevent downtime and revenue loss caused by an unforeseen outage, hardware failure or natural disaster.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

CenturyLink Technology Solutions

Monitoring Physical Threats in the Modern Data Center
sponsored by Ingram Micro
WHITE PAPER: Learn how your organization can protect against data center physical threats that can elude traditional monitoring methods. This paper outlines these threats and suggests approaches to deploying monitoring devices and reducing downtime.
Posted: 17 Apr 2012 | Published: 17 Apr 2012

Ingram Micro

The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER: Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011

AT&T Corp

The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.
Posted: 08 Mar 2012 | Published: 30 Dec 2011

Zenprise

Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

GFI Software

An Integrated Security Solution for the Virtual Data Center and Cloud
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this paper, explore the implications of virtualized workloads and discover an effective approach to providing pervasive and consistent protection for the entirety of the evolving data center.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Juniper Networks, Inc.

Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER: This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Lumension

The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER: In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Lumension

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

HP TippingPoint Intrusion Prevention System
sponsored by HPM Networks
WHITE PAPER: HP TippingPoint leads the entire Network Security Intelligence community in vulnerability research, providing the necessary information to stay ahead of the threat landscape. This document will provide summaries of the data provided by top sources.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

HPM Networks

Managing the Risk of Network Changes
sponsored by RedSeal Networks
WHITE PAPER: This paper discusses the challenges of change management and offers an effective 6-stage process for managing change. In addition, discover how RedSeal can improve the efficiency and effectiveness of each stage.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

RedSeal Networks

Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER: This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

Bradford Networks

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software

Are You Securely Delivering Enterprise Data and Services?
sponsored by OpenText Security Solutions
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

OpenText Security Solutions

Secure Your Journey to the Cloud with Data Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Trend Micro, Inc.

Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Trend Micro, Inc.

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

GroupLogic

Yes You Can Connect Employees' Personal Smartphones
sponsored by BlackBerry
WHITE PAPER: Employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Disregarding the real productivity benefits from connected employees, until now many IT departments have been too concerned with security and control risks.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

The CIO's Guide to Wireless in the Enterprise
sponsored by BlackBerry
WHITE PAPER: Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with business mobility and where to find additional resources for consideration.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

The CIO's Guide to Mobile Unified Communications
sponsored by BlackBerry
WHITE PAPER: Unified Communications (UC) integrates multiple communications modes and allows workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

Embracing Employee-Acquired Smartphones without Compromising Security
sponsored by BlackBerry
WHITE PAPER: More and more users are using their own smartphones at work – and it’s crucial that IT departments have a clearly defined  strategy for dealing with these devices. BlackBerry Enterprise Server Express is a cost-effective solution to help IT manage the challenges of security, cost and IT control while balancing the needs of employees.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER: PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011

Intel

Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Dell SecureWorks