Ad Blocker Software White Papers

(View All Report Types)
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

The Match Game: Is Offshoring a Fit for Your Help Desk Outsourcing Strategy?
sponsored by ABS Associates, Inc.
WHITE PAPER: Let's examine the pros and cons of each as well as different situations where one or the other is the ideal match for your service desk strategy.
Posted: 13 Feb 2008 | Published: 13 Feb 2008

ABS Associates, Inc.

Integrated Solutions for Defect and Project Tracking
sponsored by TechExcel
WHITE PAPER: This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
Posted: 05 Jun 2008 | Published: 05 Jun 2008

TechExcel

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

HP Integrity Systems: Family Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Hewlett Packard Enterprise

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Increasing Data Center Density While Driving down Power and Cooling Costs
sponsored by Intel Corporation
WHITE PAPER: This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.
Posted: 24 Jul 2008 | Published: 01 Jun 2006

Intel Corporation

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER: Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Sunbelt Software

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity
sponsored by Oracle Corporation
WHITE PAPER: Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation