Web Usage Policies

Web Usage Policies White Papers (View All Report Types)
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Why are Acronis Cyber Protection Solutions Threatagnostic?
sponsored by Acronis
WHITE PAPER: Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 14 Apr 2021 | Published: 31 Dec 2020

Acronis

The NBA & WNBA manage complexity associated with the 2020 season
sponsored by ServiceNow
WHITE PAPER: This paper explains how the NBA & WNBA were able to create and integrate nine customized workflows to screen, track, and grant tiered access for all the players and staff with the help of ServiceNow.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

TOPICS:  IT Management
ServiceNow

DNS - Top cybersecurity trends 2021: Trojans and droppers
sponsored by Cisco Umbrella
WHITE PAPER: Trojans themselves never stopped being popular — they’ve been a proven, tried-and-true attack methodology for years. Trojans are now being reused in new ways, as part of an orchestrated effort in multi-staged attacks. Find out how they are shaking up the threat landscape during the global pandemic.
Posted: 16 Aug 2021 | Published: 12 Mar 2021

TOPICS:  Security
Cisco Umbrella

11 Required Monitoring Platform Capabilities for Enterprise DevOps Teams eBook
sponsored by Datadog
WHITE PAPER: As DevOps teams work with an unprecedented volume of data, effective end-to-end monitoring is a key capability for any DevOps initiative. Here, explore the 11 required monitoring platform capabilities for enterprise DevOps teams. Download it here.
Posted: 10 Dec 2021 | Published: 21 Jan 2021

Datadog

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: Access this paper to learn about Customer IAM and how it is similar to IAM and learn the key ways they are different from each other. Find out which could be the right choice for your organization.
Posted: 27 May 2021 | Published: 27 May 2021

TOPICS:  IT Management
Okta

The Human Experience of IT Service Management
sponsored by ServiceNow
WHITE PAPER: Positive employee experiences can lead to excellent customer experiences. Learn how positive workforce experiences can easily be derailed if the technology, tools, and processes employees use don't allow them to work efficiently and painlessly.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  IT Management
ServiceNow