7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER:
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008
|
|
|
802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007
|
|
|
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006
|
|
|
Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER:
Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007
|
|
|
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER:
Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007
|
|
|
Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER:
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER:
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007
|
|
|
Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER:
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006
|
|
|
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER:
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008
|
|
|
EMC Documentum Information Rights Management
sponsored by EMC Corporation
WHITE PAPER:
This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients.
Posted: 05 May 2008 | Published: 12 Dec 2006
|
|
|
Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER:
This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005
|
|
|
Facilitating Enterprise PCI DSS Compliance - Executive Summary
sponsored by Globalscape
WHITE PAPER:
The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
Posted: 16 Apr 2008 | Published: 15 Apr 2008
|
|
|
Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER:
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Get Ready for Master Data Management: Ten Things You Can Do Now
sponsored by Kalido
WHITE PAPER:
This paper explians in detail ten things you can do now to prepare for your master data management initiative.
Posted: 27 Oct 2008 | Published: 27 Oct 2008
|
|
|
Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER:
This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008
|
|
|
Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER:
This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008
|
|
|
Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER:
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|
|
Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER:
Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005
|
|
|
Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER:
When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007
|
|
|
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER:
This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006
|
|
|
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008
|
|
|
Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER:
Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008
|
|
|
The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER:
This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007
|
|