Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER:
Self-encrypting drives (SEDs) provide the last line of defense, protecting critical data stored at the endpoints. Discover how SEDs satisfy regulations and compliance, lower TCO, increase IT efficiency, and, of course, secure data while preventing a potential data breach due to lost or stolen devices.
Posted: 12 Jun 2015 | Published: 12 Jun 2015
|
|
|
Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER:
Access this white paper to learn about how flash storage not only provides the performance necessary to run these applications, but also the security to prevent data breaches.
Posted: 27 Mar 2015 | Published: 27 Mar 2015
|
|
|
Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER:
This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015
|
|
|
Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015
|
|
|
Deploying Microsoft Exchange 2013 Just Got Easier
sponsored by Citrix
WHITE PAPER:
Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.
Posted: 04 Feb 2015 | Published: 04 Feb 2015
|
|
|
Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER:
In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014
|
|
|
The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013
|
|
|
Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015
|
|
|
Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER:
This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013
|
|
|
Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER:
This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014
|
|
|
Addressing Changes in the Healthcare IT Environment
sponsored by Dell
WHITE PAPER:
Discover how cloud client computing solutions supported by VDI can help your organization tackle healthcare challenges.
Posted: 25 Nov 2014 | Published: 25 Nov 2014
|
|
|
Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014
|
|
|
Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER:
Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014
|
|
|
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER:
Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014
|
|
|
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013
|
|
|
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER:
Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013
|
|
|
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER:
Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014
|
|
|
Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER:
Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011
|
|
|
Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER:
Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013
|
|
|
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER:
Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013
|
|
|
Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER:
Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013
|
|
|
Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER:
Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013
|
|
|
How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER:
Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014
|
|
|
Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014
|
|
|
Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER:
This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013
|
|