Risk Management White Papers

(View All Report Types)
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

One Identity

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis

NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Guide to OCC updates to governance ruling
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER: In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012

IBM

Managing Communications for the World of BYOD: Deploying the Right Technology for Today's Mobile World
sponsored by RingCentral
WHITE PAPER: This Frost & Sullivan report outlines a key solution that enables mobile workers to experience constant access to business assets while using personal devices. Click through to learn how cloud-based communications services can reduce risk and high cost factors.
Posted: 17 Feb 2014 | Published: 17 Feb 2014

RingCentral

How much security does your SMB need?
sponsored by IBM
WHITE PAPER: This resource is an essential guide for SMBs looking to make the right investments in security to ensure optimum protection.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

IBM

How to Protect your Data from Devastating Security Breaches
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Download this exclusive whitepaper to learn about defining, detecting, defending, and deterring threats before they bring your company to its knees.
Posted: 12 Feb 2014 | Published: 16 Jan 2013

Hewlett-Packard Enterprise

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
Posted: 03 Feb 2014 | Published: 31 May 2013

IBM

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd