Security Management White Papers

(View All Report Types)
The Evolution of Data Deduplication
sponsored by Fujitsu
WHITE PAPER: This informative paper takes an in-depth look at data deduplication, examining the evolution of the process and discussing how your organization can best apply it to reap the most benefits.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

Fujitsu

Expert Strategies: How to Adapt to Social Media While Making Sure You Stay Compliant
sponsored by Bloomberg
WHITE PAPER: In this expert white paper, gain insight on how to successfully keep compliant while protecting your business from the potential risks associated with using social media as a business tool.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Bloomberg

For Secure Access, Passwords Alone Do Not Work
sponsored by Verizon
WHITE PAPER: This informative paper explores an innovative alternative to passwords. Discover how multifactor authentication can provide a higher level of security than a password alone and find out how this solution can comprehensively enhance your data protection strategy. Read on now to learn more.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
sponsored by Verizon
WHITE PAPER: This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

How Secure is Your Platform With the Evolving Threat Landscape?
sponsored by IBM
WHITE PAPER: This exclusive paper analyzes the business differentiators among the leading security vendors and examines how safe they can actually keep your data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Mapping Security For Your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID Global
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID Global

Emerging Security Trends and Risks: Insights for the Business Executive
sponsored by IBM
WHITE PAPER: This report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
Posted: 15 Nov 2013 | Published: 30 Jun 2012

IBM

Sample Corporate Mobile Device Acceptable Use and Security Policy
sponsored by Wisegate
WHITE PAPER: In this exclusive white paper, gain insight on how senior-level IT security professionals have approached the bring-your-own-device (BYOD) trend thus far, and which strategies have led to success or failure.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Wisegate

Best Practices for Secure Data Management Across Any Device
sponsored by Citrix
WHITE PAPER: This crucial paper discusses how the surface area of risk has dramatically increased, and also examines what kind strategies and best practices you can employ to secure corporate data on mobile devices.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Citrix

Server Security Survey Report
sponsored by Bit9, Inc.
WHITE PAPER: In October 2013, Bit9 conducted a survey on server security designed to analyze challenges in the inability to detect or stop advanced attacks – click now to discover key findings and takeaways.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Bit9, Inc.

Why the Endpoint Must be the New Security Focus
sponsored by Bit9, Inc.
WHITE PAPER: Download this new eBook now to learn how a holistic security stance that combines network and endpoint security will provide greater automated intelligence and network-layer awareness and best practices for achieving real-time situational awareness to improve security and allow for better-informed decision-making.
Posted: 12 Nov 2013 | Published: 12 Nov 2013

Bit9, Inc.

Solitaire: Is your platform secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyses three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 12 Nov 2013 | Published: 12 Nov 2013

IBM

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This whitepaper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.
Posted: 12 Nov 2013 | Published: 12 Nov 2013

Citrix

Next-Generation Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Securing Enterprise Applications
sponsored by IBM and Juniper
WHITE PAPER: This informative resource discusses a comprehensive set of application security solutions that provide highly effective security services for applications on your network, mobile devices, and even in the cloud.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Protect Data in VMware-Based Environments with IBM Tivoli Solutions
sponsored by IBM
WHITE PAPER: This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data.
Posted: 07 Nov 2013 | Published: 31 Jul 2013

IBM

Pay-as-you-Grow Data Protection
sponsored by IBM
WHITE PAPER: This resource examines the data protection requirements of small to midsize businesses (SMBs), and introduces a strategy that enables your organization meet the challenges of explosive data growth.
Posted: 07 Nov 2013 | Published: 28 Feb 2013

IBM

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM