Data Security White Papers

(View All Report Types)
Demystifying Deduplication for Backup with the Dell DR4000
sponsored by Dell Software
WHITE PAPER: A disruption in the availability of data can break business continuity. Any good impact analysis must consider how quickly data access can be restored and how recent the data must be. Tape backup is no longer effective for all scenarios, and disk-based backup presents challenges as well. Is data deduplication the answer? Read the White Paper
Posted: 23 Aug 2013 | Published: 31 Jan 2012

Dell Software

ESG Lab Validation Report: Dell PowerVaultDL4000 Appliance
sponsored by Dell Software
WHITE PAPER: IT teams today are faced with swelling data volumes and expanding virtualization, both of which complicate the protection landscape and challenge your staff's resources. The DL4000 protects both physical and virtual servers, nearly eliminating backup windows and providing recovery assurance for data and applications. Read the Report
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

Delivering IT to the Virtual Workforce
sponsored by Citrix
WHITE PAPER: Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.
Posted: 13 Aug 2013 | Published: 30 Jun 2011

Citrix

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by TechTarget Security
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security

Hitachi Dynamic Virtual Controller Technology: Optimize Dynamic Workloads
sponsored by Hitachi Vantara
WHITE PAPER: This paper examines the complexity and management challenges presented by the current storage landscape, the explosive growth of data storage requirements and what it all means to businesses.
Posted: 02 Aug 2013 | Published: 30 Apr 2012

Hitachi Vantara

Top Reasons Why Customers Virtualize Their Servers With EMC VSPEX
sponsored by OnX USA LLC
WHITE PAPER: This short resource explores the top nine reasons to virtualize your servers on proven, best-in-class infrastructures to help reduce capital and operation expenses.
Posted: 31 Jul 2013 | Published: 30 Mar 2012

OnX USA LLC

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Five Critical Lessons in Disaster Recovery
sponsored by Iron Mountain
WHITE PAPER: This eBook explores what it takes to ensure you're in the best position to bounce back should disaster strike.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Enterprise Information Protection - The Impact of Big Data
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
Posted: 31 Jul 2013 | Published: 31 Mar 2013

IBM

Solution Brief: InfoSphere Optim Data Masking Solution
sponsored by IBM
WHITE PAPER: This crucial white paper examines an integrated platform for defining, integrating, protecting and managing trusted information across your systems that you can use to mask data on demand to protect privacy while ensuring security.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

EMC VSPEX Server Virtualization Solutions For Mid-Market Businesses
sponsored by OnX USA LLC
WHITE PAPER: This short resource examines a complete, modular solution designed to accelerate your business' journey through all three phases of virtualization.
Posted: 29 Jul 2013 | Published: 29 Feb 2012

OnX USA LLC

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Top 5 Reasons Why EMC For Archiving
sponsored by EMC Corporation
WHITE PAPER: Check out this resource to learn the top five reasons to use a best-of-breed archive solution and protection storage to conquer the challenges surrounding big data.
Posted: 25 Jul 2013 | Published: 31 May 2013

EMC Corporation

Generating Proven Business Value with EMC Next-Generation Backup and Recovery
sponsored by EMC Corporation
WHITE PAPER: This white paper explores one vendor's family of next-generation backup and recovery solutions that have helped companies across all industries backup and protect their data.
Posted: 25 Jul 2013 | Published: 31 Oct 2011

EMC Corporation

EMC Best Practices in Data Protection Monitoring
sponsored by EMC Corporation
WHITE PAPER: This resource discusses the modern-day dilemma of multiple vendors in a backup and recovery environment and provides insight into one vendor's solution.
Posted: 25 Jul 2013 | Published: 28 Feb 2013

EMC Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Demonstrating Proven Business Value Through Backup Redesign with EMC: Dealing with an Ageing Tape Library
sponsored by EMC
WHITE PAPER: This white paper explores how one organization implemented a modernized backup solution to achieve significant efficiency gains and financial savings.
Posted: 22 Jul 2013 | Published: 30 Mar 2012

EMC

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM