Acceptable Use Policy White Papers

(View All Report Types)
Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Why are Acronis Cyber Protection Solutions Threatagnostic?
sponsored by Acronis
WHITE PAPER: Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 14 Apr 2021 | Published: 31 Dec 2020

Acronis

Multilayered cybersecurity: part of modern cyber protection
sponsored by Acronis
WHITE PAPER: In this white paper, learn how you can detect an incoming, current, new, or unknown threat the moment it arrives at your endpoint.
Posted: 07 Apr 2021 | Published: 26 Jan 2021

TOPICS:  Security
Acronis

Reimagining IT Service Delivery and Operations in Unimagined Times
sponsored by ServiceNow
WHITE PAPER: Today’s workforce scenario has quickly exposed ugly IT processes. Fortunately, a lot of these challenges can be solved by combining ITSM and ITOM practices. Dive into this guide to learn the three pros of harnessing a combined ITSM and ITOM platform.
Posted: 19 Jan 2022 | Published: 15 Jul 2020

TOPICS:  IT Management
ServiceNow

IT INDUSTRY OUTLOOK
sponsored by CompTIA
WHITE PAPER: CompTIA's IT Industry Outlook 2021 is a research report that explores the trends shaping the industry, its workforce and its business models. Learn factors that could positively and negatively impact business growth in 2021, 2021 budget projections compared to 2020, and more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

CompTIA

How Slack's own developers use Slack
sponsored by Slack
WHITE PAPER: Access this paper to learn exactly how Slack's own developers use Slack to maximize collaboration between the engineering teams.
Posted: 20 Aug 2021 | Published: 26 May 2020

TOPICS:  IT Management
Slack

High Performance All Flash Ceph Cluster on Supermicro X12 CloudDC platform
sponsored by Supermicro
WHITE PAPER: Check out this e-book to learn about a Ceph cluster based on an all-flash storage server with 3rd Gen Intel® Xeon® Scalable Processors using all-flash NVMe SSDs and discover how it held up to testing by Supermicro experts.
Posted: 08 Sep 2021 | Published: 08 Sep 2021

TOPICS:  IT Management
Supermicro