Security Policies White Papers

(View All Report Types)
Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

The Value of Integrated Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
Posted: 09 Jun 2009 | Published: 07 Nov 2008

Cisco Systems, Inc.

New Security Solutions Using Intel vPro Technology
sponsored by Intel Corporation
WHITE PAPER: Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
Posted: 02 Apr 2009 | Published: 02 Apr 2009

Intel Corporation

Success with Static Analysis for Security: Why Code Audits Fail
sponsored by Parasoft Corporation
WHITE PAPER: This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Parasoft Corporation

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010

BlackBerry

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation

Small Business Security: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

Network Security Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008

Cisco Systems, Inc.

Developing an Effective Corporate Mobile Policy
sponsored by BlackBerry
WHITE PAPER: By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
Posted: 19 Jun 2008 | Published: 01 Jun 2008

BlackBerry

Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER: Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007

BeyondTrust Corporation

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Planning a Successful Rollout and Implementation of a Network Access Control (NAC) System
sponsored by Forescout Technologies, Inc.
WHITE PAPER: Are you looking to deploy a NAC solution? Concerned with the deployment challenges? This white paper examines how to minimize network disruption and maintain user productivity while deploying network access control policies.
Posted: 23 Mar 2007 | Published: 01 Jan 2006

Forescout Technologies, Inc.

Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER: Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006

Sybase iAnywhere

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation