The CIO's Guide to Mobile Unified Communications
sponsored by BlackBerry
WHITE PAPER:
Unified Communications (UC) integrates multiple communications modes and allows workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Posted: 12 Sep 2011 | Published: 12 Sep 2011
|
|
|
Embracing Employee-Acquired Smartphones without Compromising Security
sponsored by BlackBerry
WHITE PAPER:
More and more users are using their own smartphones at work – and it’s crucial that IT departments have a clearly defined strategy for dealing with these devices. BlackBerry Enterprise Server Express is a cost-effective solution to help IT manage the challenges of security, cost and IT control while balancing the needs of employees.
Posted: 12 Sep 2011 | Published: 12 Sep 2011
|
|
|
Tokenization Buyer's Guide
sponsored by Intel
WHITE PAPER:
PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs.
Posted: 12 Sep 2011 | Published: 08 Sep 2011
|
|
|
Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER:
This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011
|
|
|
InfoSphere Optim Data Redaction
sponsored by IBM
WHITE PAPER:
As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information? In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs.
Posted: 23 Aug 2011 | Published: 23 Aug 2011
|
|
|
Turning Security Upside-Down
sponsored by OpenText Security Solutions
WHITE PAPER:
This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defence strategy and learn how cloud-based solutions fit into the security technology market.
Posted: 29 Jul 2011 | Published: 29 Jul 2011
|
|
|
Easy DLP - Data Protection Loss
sponsored by Boldon James
WHITE PAPER:
This paper provides technical solutions that address the security requirements of DLP. Explore how Easy DLP can provide major benefits of controlling information flow and raising end-user awareness without wasting time and effort.
Posted: 19 Jul 2011 | Published: 19 Jul 2011
|
All resources sponsored by Boldon James
|
|
Steer Safely into the Cloud
sponsored by Layer 7 Technologies
WHITE PAPER:
Despite the many benefits, cloud computing also introduces new security risks and compromises the traditional control of IT, hindering many business from adoption. This paper offers insight into cloud governance, that helps tackle cloud security concerns and provides a path that will guide businesses to the cloud in a controlled and secured manner.
Posted: 18 Jul 2011 | Published: 18 Jul 2011
|
|
|
3 undeniable use cases for automated IAM controls
sponsored by IBM
WHITE PAPER:
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
Posted: 01 Jul 2011 | Published: 03 Jan 2011
|
|
|
Managing data and application security risks cost effectively
sponsored by IBM
WHITE PAPER:
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.
Posted: 01 Jul 2011 | Published: 01 Oct 2009
|
|
|
Oracle Identity Analytics- A Business Perspective
sponsored by Oracle Corporation
WHITE PAPER:
This white paper reviews what Oracle Identity Analytics is as a solution to start, or complement, your existing identity management deployment towards reaching your identity and access governance goals.
Posted: 13 Jun 2011 | Published: 01 Feb 2010
|
|
|
Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER:
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011
|
|
|
The Future of Enterprise Computing: Preparing for the Compute Continuum
sponsored by Intel
WHITE PAPER:
Server virtualization and the cloud are creating a future for enterprise computing in which access to information via a variety of devices from any location at any time will be mission-critical. Access this exclusive resource to help formulate a plan for a continuous end-user experience.
Posted: 13 Jun 2011 | Published: 01 May 2011
|
|
|
Ponemon Institute - Seven Tips for Securing Mobile Workers
sponsored by Sophos UK
WHITE PAPER:
This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organisation's networks, data and reputation.
Posted: 07 Jun 2011 | Published: 02 May 2011
|
|
|
Seven Tips for Securing Mobile Workers
sponsored by Sophos
WHITE PAPER:
This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organization's networks, data and reputation.
Posted: 01 Jun 2011 | Published: 02 May 2011
|
|
|
Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER:
This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011
|
|
|
Mobility Advantage: Why Secure Your Mobile Devices
sponsored by Sybase, an SAP company
WHITE PAPER:
The use of enterprise mobile devices is on the rise yet few companies have a mobile security strategy. Get this paper now and see how you can protect your mobile devices and data from unwanted eyes.
Posted: 31 May 2011 | Published: 31 May 2011
|
|
|
Information security and compliance services overview
sponsored by DellEMC and Intel®
WHITE PAPER:
With new threats emerging and the pressures the meet compliance, your organization is forced to focus more on security and less on strategic projects that drive your business. Access this paper for an overview of security and compliance solutions available to help handle your security issues, freeing your time to focus on growing your business.
Posted: 18 May 2011 | Published: 18 May 2011
|
|
|
Achieving PCI compliance with Dell SecureWorks' security services
sponsored by DellEMC and Intel®
WHITE PAPER:
It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
Posted: 18 May 2011 | Published: 18 May 2011
|
|
|
Simplifying management and lowering total cost of ownership for SSL certificates
sponsored by GlobalSign
WHITE PAPER:
This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.
Posted: 17 May 2011 | Published: 17 May 2011
|
|
|
Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER:
Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011
|
|
|
Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
sponsored by Imprivata
WHITE PAPER:
This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
Posted: 07 Apr 2011 | Published: 07 Apr 2011
|
|
|
Alternatives for Securing Virtual Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER:
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.
Posted: 29 Mar 2011 | Published: 28 Mar 2011
|
|
|
Gunner Peterson's Security Gateway Buyer’s Guide
sponsored by Intel
WHITE PAPER:
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
Posted: 25 Mar 2011 | Published: 25 Mar 2011
|
|
|
Intel Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms – Cloud Gateway Security with Intel® SOA Expressway
sponsored by Intel
WHITE PAPER:
The Intel Cloud Builders program provides a starting point by supplying a basic hardware blueprint and available cloud software management solutions, such as Intel® SOA Expressway. The use cases described in this reference architecture can be used as a baseline to build more complex usage and deployment models to suit specific customer needs.
Posted: 22 Feb 2011 | Published: 22 Feb 2011
|
|