Zero Day Threats White Papers

(View All Report Types)
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks

Business Value Analysis Study: Citizens Business Bank
sponsored by Symantec Corporation
WHITE PAPER: As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Move Web Application Security Testing into Your Development Cycle
sponsored by IBM
WHITE PAPER: This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

IBM

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Reinventing the Desktop
sponsored by Pano Logic, Inc
WHITE PAPER: Pano is a solution built specifically for desktop virtualization and it consists of a palm-sized device that connects a user's keyboard, mouse, monitor, and USB.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Pano Logic, Inc

Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER: This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005

Siemens

The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER: This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007

Vyatta Inc.

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation