Continuous monitoring, remediation and CyberScope reporting
sponsored by IBM
WHITE PAPER:
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).
Posted: 19 Jul 2012 | Published: 31 Dec 2011
|
|
|
2012 Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER:
Today’s SMBs are increasingly forced to invest in new measures to protect their endpoints and their business from cyber threats. This resource explores key findings from the Symantec 2012 Endpoint Security Survey and offers best practices and recommendations for reducing the risk of a successful cyber attack.
Posted: 29 Jun 2012 | Published: 29 Jun 2012
|
|
|
Why choose Symantec for Mobile Device Management
sponsored by Symantec Corporation
WHITE PAPER:
In this white paper, learn some of the most important considerations for deploying a mobile device management solution. Additionally, discover key tips for building a successful framework for planning your mobile security strategy.
Posted: 01 Jun 2012 | Published: 01 Jun 2012
|
|
|
Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER:
This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012
|
|
|
Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER:
Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012
|
|
|
Palo Alto Networks in the Data Center: Eliminating Compromise
sponsored by Palo Alto Networks
WHITE PAPER:
This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012
|
|
|
Building a Disaster Ready Infrastructure
sponsored by CenturyLink Technology Solutions
WHITE PAPER:
This white paper explores the factors surrounding a well implemented disaster recovery/business continuity plan that will ensure minimal impact to your organization. Read now to find out how you can prevent downtime and revenue loss caused by an unforeseen outage, hardware failure or natural disaster.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
Monitoring Physical Threats in the Modern Data Center
sponsored by Ingram Micro
WHITE PAPER:
Learn how your organization can protect against data center physical threats that can elude traditional monitoring methods. This paper outlines these threats and suggests approaches to deploying monitoring devices and reducing downtime.
Posted: 17 Apr 2012 | Published: 17 Apr 2012
|
|
|
The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER:
Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011
|
|
|
The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER:
Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.
Posted: 08 Mar 2012 | Published: 30 Dec 2011
|
|
|
Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER:
SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012
|
|
|
An Integrated Security Solution for the Virtual Data Center and Cloud
sponsored by Juniper Networks, Inc.
WHITE PAPER:
In this paper, explore the implications of virtualized workloads and discover an effective approach to providing pervasive and consistent protection for the entirety of the evolving data center.
Posted: 16 Feb 2012 | Published: 16 Feb 2012
|
|
|
Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER:
This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012
|
|
|
The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER:
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
|
|
|
Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER:
Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011
|
|
|
HP TippingPoint Intrusion Prevention System
sponsored by HPM Networks
WHITE PAPER:
HP TippingPoint leads the entire Network Security Intelligence community in vulnerability research, providing the necessary information to stay ahead of the threat landscape. This document will provide summaries of the data provided by top sources.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
|
|
|
Managing the Risk of Network Changes
sponsored by RedSeal Networks
WHITE PAPER:
This paper discusses the challenges of change management and offers an effective 6-stage process for managing change. In addition, discover how RedSeal can improve the efficiency and effectiveness of each stage.
Posted: 14 Dec 2011 | Published: 14 Dec 2011
|
|
|
Securing Network Access for Guests and Contractors
sponsored by Bradford Networks
WHITE PAPER:
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization.
Posted: 12 Dec 2011 | Published: 12 Dec 2011
|
|
|
Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER:
This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011
|
|
|
Are You Securely Delivering Enterprise Data and Services?
sponsored by OpenText Security Solutions
WHITE PAPER:
Cloud-adoption solutions to prevent from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011
|
|
|
Secure Your Journey to the Cloud with Data Protection
sponsored by Trend Micro, Inc.
WHITE PAPER:
View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security.
Posted: 07 Oct 2011 | Published: 07 Oct 2011
|
|
|
Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER:
Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.
Posted: 07 Oct 2011 | Published: 07 Oct 2011
|
|
|
Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER:
Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011
|
|
|
Yes You Can Connect Employees' Personal Smartphones
sponsored by BlackBerry
WHITE PAPER:
Employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Disregarding the real productivity benefits from connected employees, until now many IT departments have been too concerned with security and control risks.
Posted: 12 Sep 2011 | Published: 12 Sep 2011
|
|
|
The CIO's Guide to Wireless in the Enterprise
sponsored by BlackBerry
WHITE PAPER:
Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with business mobility and where to find additional resources for consideration.
Posted: 12 Sep 2011 | Published: 12 Sep 2011
|
|