Security Management White Papers

(View All Report Types)
Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

How to Create a Quality Cloud Security Solution
sponsored by XO Communications
WHITE PAPER: In this exclusive resource, find out how you can build a safe and effective cloud security strategy to ensure that your sensitive data stays in the right hands while utilizing the cloud.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

XO Communications

Burning Dollars: Three Myths of Telecom Savings
sponsored by Dimension Data
WHITE PAPER: In this white paper, explore 3 telecom savings myths debunked, and how organizations must achieve greater visibility in their networks to differentiate perceived and realized value of their mobile investments.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Dimension Data

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Scaling Next-Generation Firewalls with Citrix NetScaler
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: IT professionals are always looking for new ways to deliver their applications quickly and effectively.This guide outlines next-generation firewalls that can help your network when you need more throughput.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

Citrix and Palo Alto Networks

A World-class Pediatric Medical Center
sponsored by IBM
WHITE PAPER: As data growth skyrockets in hospital information systems, IT departments are realizing the challenge in managing data for compliance while maintaining a secure environment. This guide explores the importance of centralizing your security and compliance management.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

IBM

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos

Three Guiding Principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
Posted: 19 Dec 2013 | Published: 31 Oct 2012

IBM

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER: In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Trend Micro

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Sophos

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 13 Dec 2013 | Published: 31 Dec 2013

Global Knowledge

Ponemon Study: The State of Advanced Persistent Threats
sponsored by Trusteer
WHITE PAPER: In this Ponemon Institute study, you'll learn how APTs are changing the threat landscape and making current security controls ineffective, and the best practices for making sure your security solution makes the cut.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Trusteer

A Manager's Guide To Unified Threat Management And Next-Generation Firewalls
sponsored by Sophos
WHITE PAPER: As the threat landscape becomes more dangerous, businesses are deploying unified threat management (UTM) systems. This guide explores the important question of - Which UTM option is right for your organization?
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Sophos

Information Security Emagazine: Best Practices for the Evolving Threat Landscape
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Hewlett-Packard Enterprise

Flexibly Align Data Protection to different SLAs
sponsored by Fujitsu
WHITE PAPER: This exclusive white paper discusses a data backup tool that can flexibly align data protection to different service level agreements (SLAs) to enhance your data protection environment and ensure speedy recovery when disaster inevitably strikes.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Fujitsu

Minimize Downtime With a Disaster-Resilient Architecture
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a backup and recovery solution that helps software-based backup data protection infrastructures reach previously unknown service levels.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Fujitsu

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

A Practical Disaster Recovery Protection Tool
sponsored by Fujitsu
WHITE PAPER: This exclusive paper examines a set of disk-based backup solutions that use data deduplication technology to reduce the disk capacity required to store backup data by 90%, making WAN-based replication a practical DR protection tool.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Fujitsu

Integrating security with HP TippingPoint
sponsored by HP & Intel®
WHITE PAPER: Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance.
Posted: 22 Nov 2013 | Published: 30 Nov 2012

HP & Intel®