Data Security White Papers

(View All Report Types)
Mobile device controls: MDM security features vs. mobile native security
sponsored by TechTarget Security
WHITE PAPER: When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

TechTarget Security

Go Daddy Sets a New Standard for SecureOnline Experiences
sponsored by Trend Micro
WHITE PAPER: As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.
Posted: 11 Apr 2013 | Published: 31 Dec 2011

Trend Micro

Network Security Technologies Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

TechTarget Security

Solving the BYOD Puzzle with Google Apps
sponsored by Google
WHITE PAPER: This resource explores the challenges of the bring your own device (BYOD) trend an introduces how Google Apps allows both data and functionality to live in the cloud, overcoming these challenges.
Posted: 08 Mar 2013 | Published: 31 Dec 2012

Google

Network Security Essential Guide
sponsored by TechTarget Security
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER: What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Citrix VDI-in-a-Box: Simplify desktop virtualization with VDI that costs less than a PC
sponsored by Citrix
WHITE PAPER: Discover how you can gain virtual desktops for less than the cost of maintaining your current PCs in this essential white paper. Plus, compare the cost per virtual desktop across four desktop virtualization solutions.
Posted: 27 Sep 2012 | Published: 31 Dec 2011

Citrix

Citrix VDI-in-a-Box: Simplify desktop virtualization with VDI that costs less than a PC
sponsored by Citrix
WHITE PAPER: Discover how you can gain virtual desktops for less than the cost of maintaining your current PCs in this essential white paper. Plus, compare the cost per virtual desktop across four desktop virtualization solutions.
Posted: 27 Sep 2012 | Published: 31 Dec 2011

Citrix

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Enterprise

Leveling the playing field: How companies use data for competitive advantage
sponsored by SAP America, Inc.
WHITE PAPER: Data is a critical asset to the competitiveness of your organization, yet only 27% of people in a recent study said their companies do a better job using information than their competitors. Read this study by the Economist Intelligence Unit to find best practices about developing data initiatives to gain a competitive advantage.
Posted: 13 Sep 2012 | Published: 13 Sep 2012

SAP America, Inc.

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Cloud-delivered Endpoint Security
sponsored by OpenText Security Solutions
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

OpenText Security Solutions

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett Packard Enterprise

Cisco IBSG Global Research Reveals New Ways for Banks To Prosper in an Omnichannel World
sponsored by Cisco Systems, Inc.
WHITE PAPER: Banking customers worldwide are ready for an omnichannel experience – are you ready to give it to them? This resource describes the concept of omnichannel banking, why your customers need it, and why you shouldn't wait to offer it to them.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

Cisco Systems, Inc.

The Expanding Network Perimeter: How to Protect it With Unified Threat Management
sponsored by Sophos
WHITE PAPER: Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Sophos

Outperforming in a data-rich, hyper-connected world
sponsored by IBM
WHITE PAPER: This paper outlines the results of a survey conducted amongst more than 1,100 executives across nine industries in 64 countries on their ability to capture data, share insights and take actions based on what they learn. Read this now to discover how other companies are harnessing and handling their data and learn how you can follow a similar path.
Posted: 09 Aug 2012 | Published: 08 Aug 2012

IBM

VW Credit, Inc. Drives Better Backups with ExaGrid
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this brief case study today to explore one company's journey to better backups.
Posted: 08 Aug 2012 | Published: 08 Aug 2012

ExaGrid Systems, Inc.

The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Uncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Zenprise

The Social Business: Advent of a new age
sponsored by IBM
WHITE PAPER: This paper outlines the why organizations need to become social businesses today. Read on to learn how your business can become social through crafting the right blueprint relying on networks, social and real-time collaboration, mobility and integration, how to deepen your customer relationships and the benefits associated with it, and much more.
Posted: 30 Jul 2012 | Published: 16 Feb 2011

IBM

Webroot Secure Anywhere Business - Mobile Protection
sponsored by OpenText Security Solutions
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

OpenText Security Solutions

Cloud-based File Management System for BlackBerry PlayBook Tablet Customers
sponsored by BlackBerry
WHITE PAPER: Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM