Security Best Practices White Papers

(View All Report Types)
Computer Weekly special report: The State of the Nation in Mobility
sponsored by BlackBerry
WHITE PAPER: Sales of tablets and smartphones are surging—find out how that's affecting enterprise security.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

BlackBerry

Getting a better grip on mobile devices
sponsored by IBM
WHITE PAPER: This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture.
Posted: 13 Aug 2013 | Published: 13 Aug 2013

IBM

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by TechTarget Security
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security

Enabling Safe and Secure BYOD in the Enterprise
sponsored by Dell Software
WHITE PAPER: This exclusive paper discusses a fully integrated solution for managing supported desktops, laptops servers, and mobile devices, making secure BYOD an achievable reality for your organization.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Dell Software

Cloud security concerns you must address
sponsored by HP & Intel®
WHITE PAPER: This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data.
Posted: 01 Aug 2013 | Published: 26 Jul 2013

HP & Intel®

Secure the Enterprise with Confidence
sponsored by IBM
WHITE PAPER: This informative paper examines how organizations are addressing this increase in security threats and how today's mainframe can be used as a secure application platform.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

IBM

Three Must-Have Security Measures to Empower Data Centre Transformation
sponsored by Cisco
WHITE PAPER: As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Cisco

Six Essential Steps for Unleashing the Power of Enterprise Mobility
sponsored by Cisco
WHITE PAPER: While devices are driving the mobile revolution, they are merely the first step to a truly mobile-friendly enterprise.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Cisco

Third Annual Juniper Networks Mobile Threats Report
sponsored by IBM and Juniper
WHITE PAPER: This exclusive paper discusses the major trends that have been gaining momentum in the field of mobile threats, outlining what kinds of attacks are increasing, who is being affected and how these trends could impact future mobile technology development.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

IBM and Juniper

Solution Brief: InfoSphere Optim Data Masking Solution
sponsored by IBM
WHITE PAPER: This crucial white paper examines an integrated platform for defining, integrating, protecting and managing trusted information across your systems that you can use to mask data on demand to protect privacy while ensuring security.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Three principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this exclusive white paper, discover three key guiding principles that can help improve data security and compliance. Read on and also learn about how you can ensure that your private data remains private.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Cyber Security Intelligence Index - Analysis of Cyber Security attack and incident data
sponsored by IBM
WHITE PAPER: IBM Managed Security Services continuously monitors tens of billions of events per day, and this white paper provides you the opportunity to gain insight into what this data really means. Read on to discover the prevalent types of attacks and attackers and the key factors enabling them.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

IBM

Top 5 Myths about Mobile Security
sponsored by Sophos
WHITE PAPER: This expert paper examines the top five myths about mobile security, detailing why these concepts are mistaken for truth and what you can do to appropriately alter your mobile security profile.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

Sophos

2013 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

IBM

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Beyond the Next Generation: Putting Advanced Network Security To Work
sponsored by IBM
WHITE PAPER: This informative white paper highlights specific examples of the ways in which these CSN systems put today's more advanced capabilities to work in practical application, rather than catering to one specific capability.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

How to Make Your Business More Flexible & Cost Effective?
sponsored by Panda Security
WHITE PAPER: Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Panda Security

Panda Cloud Systems Management: Partners and Administrator's Guide
sponsored by Panda Security
WHITE PAPER: This crucial resource takes an in-depth look at a cloud-based remote device monitoring and management solution that offers high-quality service while promoting task automation to increase efficiency.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Panda Cloud Systems Management: Reports Datasheet
sponsored by Panda Security
WHITE PAPER: This crucial paper examines a cloud-based IT management solution that provides detailed and measurable reports to justify time spent and show all of the actions you have taking remotely preventing and managing problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security