Website Security White Papers

(View All Report Types)
How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

AVG Technologies USA, Inc.

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

The four rules of complete web protection
sponsored by Sophos
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos

Social Networking malware: The dangers facing SMBs
sponsored by GFI Software
WHITE PAPER: View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by TechTarget Security
WHITE PAPER: This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013

TechTarget Security

Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

AVG Technologies USA, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise