Acceptable Use Policy White Papers

(View All Report Types)
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

Cybersecurity resilience in an era of identity sprawl
sponsored by One Identity
WHITE PAPER: As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  Security
One Identity

Strategies for successfully managing privileged accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an identity security program is the management and governance of the accounts belonging to superusers — privileged accounts.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  Security
One Identity

Network Security for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers.
Posted: 25 Sep 2008 | Published: 25 Sep 2008

Cisco Systems, Inc.

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010

BlackBerry

Managing Risk in Outsourced Manufacturing
sponsored by E2open
WHITE PAPER: This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

E2open

Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

LogRhythm and NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.
Posted: 25 Jul 2008 | Published: 01 Jul 2008

LogRhythm, Inc.

Corporate networks: Business 2.0 and beyond
sponsored by SonicWALL
WHITE PAPER: The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.
Posted: 29 Oct 2009 | Published: 24 Jul 2009

SonicWALL