Internet Usage Policies White Papers

(View All Report Types)
BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

Why are Acronis Cyber Protection Solutions Threatagnostic?
sponsored by Acronis
WHITE PAPER: Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 14 Apr 2021 | Published: 31 Dec 2020

Acronis

The Total Economic Impact™ Of KX Insights
sponsored by KX
WHITE PAPER: Read this paper to learn the total economic impact™ of KX Insights, which will identify the cost, benefit, flexibility, and risk factors that could affect your investment decision.
Posted: 15 Jun 2022 | Published: 15 Jun 2022

TOPICS:  IT Management
KX

The modern cybersecurity landscape: Scaling for threats in motion
sponsored by Cisco Secure
WHITE PAPER: In the face of complex threats, InfoSec teams are feeling increasingly overwhelmed. The right information, however, can prepare organizations for what’s out there.Access the white paper to learn about the major threat trends that Cisco Umbrella has identified.
Posted: 08 Feb 2021 | Published: 09 Dec 2020

TOPICS:  .NET | Security
Cisco Secure

Building Tomorrow's Enterprise
sponsored by HPE and Intel®
WHITE PAPER: This paper focuses on the steps you need to take to navigate a cloud-everywhere transformation successfully and some of the best practices that will help you along the way.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

TOPICS:  IT Management
HPE and Intel®

Pennsylvania Lumbermens Mutual Insurance Company (PLM) Case Study
sponsored by VMware
WHITE PAPER: Understand how PLM uses VMware Cloud on AWS for their DR needs and how it helped them optimize their DR costs.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  IT Management
VMware

How to Optimize Cloud Operations for the Best User Experience
sponsored by Cisco
WHITE PAPER: Find out how most businesses have embraced using multiple clouds and are now working to maximize the value they get from the modern multicloud platforms including flexibility and efficiency.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  IT Management
Cisco